Karkas66 / EarlyCascadeImproovedLinks
an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code
☆19Updated 4 months ago
Alternatives and similar repositories for EarlyCascadeImprooved
Users that are interested in EarlyCascadeImprooved are comparing it to the libraries listed below
Sorting:
- rust port of pspy with support for process monitoring over dbus☆32Updated this week
- ☆18Updated 6 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 5 months ago
- Enumerate the Domain for Readable and Writable Shares☆20Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- ☆25Updated 3 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 3 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆42Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 4 months ago
- ☆48Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆40Updated 11 months ago
- Proxy function calls through the thread pool with ease☆28Updated 3 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆12Updated 3 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- Linux CS bypass technique☆33Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated 3 months ago
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- ☆26Updated 4 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆35Updated 5 months ago
- ☆59Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated this week
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- ☆50Updated 7 months ago
- BOF for C2 framework☆41Updated 7 months ago