Gr1mmie / Coeus
ADSI based SA tool
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Coeus
- Caeser Cipher your shellcode!☆20Updated 2 years ago
- ☆29Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 8 months ago
- ☆24Updated 2 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆30Updated 7 months ago
- A simple rpc2socks alternative in pure Go.☆23Updated 4 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆38Updated 11 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆27Updated last year
- Tools for Attacking Pleasant Password Server☆21Updated last year
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆34Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆31Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆81Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆51Updated last year
- ☆38Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆43Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆15Updated last year
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆21Updated last year