LuxNoBulIshit / Smug_Fu3k
☆51Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Smug_Fu3k
- Using syscall to load shellcode, Evasion techniques☆26Updated 3 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆36Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆52Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated last year
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆23Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆79Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last month
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆72Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆46Updated last year
- ProcExp Driver (Ab)use☆20Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- ☆62Updated 9 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆48Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆49Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆35Updated 2 years ago
- C# Tool to interact with MS Exchange based on MS docs☆98Updated last year
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆118Updated 3 years ago
- Active Directory certificate abuse.☆36Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆49Updated 4 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆78Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated 9 months ago
- ☆56Updated 3 years ago
- AutoStart teamserver and listeners with services☆69Updated 2 years ago
- ☆77Updated last year