MrAle98 / Sliver-PortBenderLinks
Sliver extension performing TCP redirection tasks without performing cross-process injection.
☆68Updated 11 months ago
Alternatives and similar repositories for Sliver-PortBender
Users that are interested in Sliver-PortBender are comparing it to the libraries listed below
Sorting:
- Lateral Movement via the .NET Profiler☆84Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Updated 5 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆85Updated 8 months ago
- Lockless BOF☆79Updated 7 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆105Updated 7 months ago
- ☆115Updated last year
- adws enumeration bof☆160Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆109Updated 10 months ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- ☆136Updated last month
- Click Once + App Domain☆64Updated 2 years ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆103Updated last year
- TokenCert☆102Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Internal Monologue BOF☆78Updated last year
- RPC to WebClient startup☆53Updated 4 months ago
- Python module for running BOFs☆79Updated last month
- ☆122Updated 2 years ago
- Random BOFs for LDAP tradecraft☆71Updated 3 months ago
- Your syscall factory☆126Updated last week
- Implant drop-in for EDR testing☆147Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆58Updated 5 months ago
- ☆57Updated 10 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- ☆127Updated last year
- ☆137Updated 10 months ago