JamesCooteUK / SharpSphereLinks
.NET Project for Attacking vCenter
☆551Updated 3 years ago
Alternatives and similar repositories for SharpSphere
Users that are interested in SharpSphere are comparing it to the libraries listed below
Sorting:
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆482Updated 3 years ago
- Cobalt Strike kit for Persistence☆486Updated 5 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- ☆296Updated last year
- Cobalt Strike kit for Lateral Movement☆676Updated 5 years ago
- Executes position independent shellcode from an encrypted zip☆304Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆403Updated 2 years ago
- ☆534Updated 3 years ago
- Cobalt Strike Python API☆301Updated 3 years ago
- Cobalt Strike Shellcode Generator☆665Updated 9 months ago
- ☆350Updated 3 years ago
- ☆388Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆717Updated 4 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆551Updated 5 years ago
- Run shellcode from resource☆260Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆453Updated 4 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆268Updated 5 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Updated 3 years ago
- ☆187Updated 4 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆333Updated 4 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆423Updated 4 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Updated 4 years ago
- Find specific users in active directory via their username and logon IP address☆386Updated 5 years ago
- ☆666Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆213Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆312Updated 4 years ago
- ☆363Updated 4 years ago