NocteDefensor / SCCMDecryptor-BOFLinks
☆50Updated 4 months ago
Alternatives and similar repositories for SCCMDecryptor-BOF
Users that are interested in SCCMDecryptor-BOF are comparing it to the libraries listed below
Sorting:
- Click Once + App Domain☆64Updated last year
- ☆46Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 6 months ago
- TokenCert☆100Updated 11 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Updated last year
- RPC to WebClient startup☆52Updated 2 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Updated last year
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆72Updated 3 weeks ago
- Bunch of BOF files☆35Updated 4 months ago
- SAM Dumping in C#☆54Updated 9 months ago
- ☆45Updated 3 months ago
- Local SYSTEM auth trigger for relaying - X☆150Updated 3 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆69Updated 2 weeks ago
- Lockless BOF☆79Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 8 months ago
- ☆35Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- ☆53Updated last month
- ☆32Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆88Updated 4 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆98Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆104Updated 6 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆23Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Updated 3 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆36Updated last week
- Lateral Movement via the .NET Profiler☆84Updated 11 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 6 months ago