Gr1mmie / Coeus
ADSI based SA tool
☆16Updated 2 years ago
Alternatives and similar repositories for Coeus:
Users that are interested in Coeus are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆32Updated 10 months ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 11 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆11Updated last year
- ☆24Updated 2 years ago
- ☆35Updated 8 months ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆24Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆31Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Some of my custom "tools".☆22Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- LoadLibrary for offensive operations☆32Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆8Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆24Updated 6 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆22Updated last year
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆39Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Caeser Cipher your shellcode!☆20Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆13Updated 2 months ago
- ☆19Updated 2 years ago