MzHmO / LeakedWallpaper
Leak of any user's NetNTLM hash. Fixed in KB5040434
☆255Updated 9 months ago
Alternatives and similar repositories for LeakedWallpaper
Users that are interested in LeakedWallpaper are comparing it to the libraries listed below
Sorting:
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆459Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆301Updated 6 months ago
- Attempt at Obfuscated version of SharpCollection☆206Updated 3 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆195Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆300Updated 5 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆409Updated 10 months ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆200Updated 7 months ago
- ☆277Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆140Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated 2 weeks ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆290Updated 11 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆198Updated 11 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆242Updated last month
- ☆163Updated last year
- AV bypass while you sip your Chai!☆221Updated 11 months ago
- ☆172Updated 6 months ago
- Fileless atexec, no more need for port 445☆366Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 6 months ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- My implementation of the GIUDA project in C++☆183Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆361Updated 4 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- Ghosting-AMSI☆165Updated 2 weeks ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆461Updated this week
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆199Updated 6 months ago
- ☆137Updated last year
- Kill AV/EDR leveraging BYOVD attack☆353Updated last year