MzHmO / psexec_noinstall
Repository contains psexec, which will help to exploit the forgotten pipe
☆169Updated 5 months ago
Alternatives and similar repositories for psexec_noinstall:
Users that are interested in psexec_noinstall are comparing it to the libraries listed below
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- ☆224Updated 11 months ago
- ☆155Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆153Updated last year
- ☆86Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆110Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆200Updated 3 years ago
- ☆97Updated last year
- POC tools for exploring SMB over QUIC protocol☆122Updated 3 years ago
- ☆140Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆106Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- My implementation of the GIUDA project in C++☆181Updated last year
- ☆88Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆137Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆179Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆224Updated 3 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆133Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆150Updated last year
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- Library of BOFs to interact with SQL servers☆163Updated last week
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆254Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- C# havoc implant☆99Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆177Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆235Updated last year