Creating them Golden Tickets
☆14Aug 16, 2025Updated 7 months ago
Alternatives and similar repositories for Golden-Ticket
Users that are interested in Golden-Ticket are comparing it to the libraries listed below
Sorting:
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆25Updated this week
- ☆143Feb 26, 2026Updated 3 weeks ago
- ☆19Nov 26, 2024Updated last year
- Simple script to test for clickjacking☆23Jun 21, 2021Updated 4 years ago
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated 2 months ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆122Feb 21, 2025Updated last year
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆90Feb 16, 2026Updated last month
- ☆26Nov 25, 2025Updated 3 months ago
- CTF challenge writeups☆13Dec 10, 2020Updated 5 years ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆147Dec 6, 2025Updated 3 months ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆91Mar 10, 2026Updated last week
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆79Jul 25, 2025Updated 7 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆163Feb 2, 2026Updated last month
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 7 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆156Nov 28, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 7 months ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 11 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- ☆15May 30, 2025Updated 9 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Serverless AITM Simulation Framework for Entra ID and M365☆218Dec 29, 2025Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Random Exploits☆51Sep 12, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 7 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆211Aug 21, 2025Updated 7 months ago
- ☆49Apr 9, 2025Updated 11 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago