OmerYa / Named-Pipe-SnifferView external linksLinks
Mario & Luigi - Tools for sniffing Windows Named Pipes communication
☆129Nov 15, 2016Updated 9 years ago
Alternatives and similar repositories for Named-Pipe-Sniffer
Users that are interested in Named-Pipe-Sniffer are comparing it to the libraries listed below
Sorting:
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆230May 10, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- named pipe server with impersonation☆60May 11, 2019Updated 6 years ago
- ☆409Mar 1, 2017Updated 8 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆123Jul 7, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆359Updated this week
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆233May 30, 2019Updated 6 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Stealthy backdoor for Windows operating systems☆284Feb 13, 2020Updated 6 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- ☆45Nov 5, 2018Updated 7 years ago