HulkOperator / AuthStagerLinks
☆59Updated last year
Alternatives and similar repositories for AuthStager
Users that are interested in AuthStager are comparing it to the libraries listed below
Sorting:
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Sniffing files generator☆59Updated 9 months ago
- ☆38Updated 8 months ago
- ☆61Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆27Updated 11 months ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Tool to aid in dumping LSASS process remotely☆42Updated 2 months ago
- BOF for C2 framework☆44Updated last year
- malleable profile generator GUI for Havoc☆54Updated 2 years ago
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- ☆82Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Updated 10 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- Proxy function calls through the thread pool with ease☆31Updated 9 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- ☆26Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- ☆47Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 2 weeks ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated last month
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 11 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆116Updated 2 weeks ago
- RPC to WebClient startup☆53Updated 4 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 10 months ago