MinatoTW / NamedPipeImpersonation
☆10Updated 4 years ago
Alternatives and similar repositories for NamedPipeImpersonation:
Users that are interested in NamedPipeImpersonation are comparing it to the libraries listed below
- AMSI detection PoC☆30Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- ☆25Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ☆28Updated 7 years ago
- ☆15Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆24Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 11 months ago
- ☆24Updated 3 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- Some of my custom "tools".☆22Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- ☆36Updated 3 years ago
- ☆14Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆52Updated 3 years ago
- ☆29Updated 2 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Simple skeleton for a CPP DLL☆23Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Tool to manage user privileges☆28Updated 5 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- pypykatz plugin for volatility3 framework☆39Updated 9 months ago