Karkas66 / EarlyCascadeImprooved
an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code
☆19Updated 2 months ago
Alternatives and similar repositories for EarlyCascadeImprooved
Users that are interested in EarlyCascadeImprooved are comparing it to the libraries listed below
Sorting:
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 11 months ago
- ☆18Updated 4 months ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- ☆48Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated last month
- Enumerate the Domain for Readable and Writable Shares☆18Updated 2 months ago
- BOF for C2 framework☆41Updated 6 months ago
- ☆30Updated last week
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- Lifetime AMSI bypass.☆34Updated 3 weeks ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 6 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆26Updated 4 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated 2 months ago
- Linux CS bypass technique☆33Updated 3 months ago
- Bunch of BOF files☆31Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated 2 months ago
- Nemesis agent for Mythic☆27Updated 8 months ago
- ☆34Updated 4 months ago
- ☆15Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated last month
- ☆11Updated 3 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆33Updated last month
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated last month
- ☆24Updated 2 months ago
- ☆50Updated 6 months ago