GhostPack / RestrictedAdmin
Remotely enables Restricted Admin Mode
☆208Updated 3 years ago
Alternatives and similar repositories for RestrictedAdmin:
Users that are interested in RestrictedAdmin are comparing it to the libraries listed below
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆240Updated 3 years ago
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆143Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆123Updated 3 years ago
- ☆246Updated last year
- ☆129Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆188Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆329Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- ☆135Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- ☆69Updated 3 years ago
- C# version of Powermad☆162Updated last year
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- ☆365Updated 3 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆201Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- ☆148Updated last month
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- GolenGMSA tool for working with GMSA passwords☆139Updated 11 months ago
- Beacon Object File & C# project to check LDAP signing☆187Updated 7 months ago
- MS-FSRVP coercion abuse PoC☆287Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- ☆206Updated 3 years ago