Leo4j / SessionExecLinks
Execute commands in other Sessions
☆89Updated last year
Alternatives and similar repositories for SessionExec
Users that are interested in SessionExec are comparing it to the libraries listed below
Sorting:
- A C# port from Invoke-GhostTask☆117Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- ☆92Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆49Updated 2 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- To audit the security of read-only domain controllers☆117Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆102Updated last year
- ☆98Updated last year
- ☆81Updated last year
- ☆91Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆81Updated 2 years ago
- Library of BOFs to interact with SQL servers☆204Updated last month
- ☆142Updated 2 years ago
- ☆100Updated 2 years ago
- CVE-2024-40711-exp☆42Updated 11 months ago
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 6 months ago
- Abuse leaked token handles.☆132Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆142Updated 6 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆41Updated last year
- ☆49Updated 5 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆90Updated 4 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated last year
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆113Updated 3 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- ☆72Updated last year
- Active Directory certificate abuse☆39Updated 3 years ago
- Lateral Movement☆124Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago