OmriBaso / BesoTokenLinks
A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).
☆93Updated 3 years ago
Alternatives and similar repositories for BesoToken
Users that are interested in BesoToken are comparing it to the libraries listed below
Sorting:
- ☆120Updated 9 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Async Python library to parse local and remote disk images.☆82Updated 5 months ago
- Living Off the Foreign Land setup scripts☆73Updated 10 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆119Updated last year
- ☆137Updated 10 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- ☆88Updated 3 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆93Updated last year
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- Decrypt GlobalProtect configuration and cookie files.☆159Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Find .net assemblies locally☆129Updated 3 years ago
- Decrypt Veeam database passwords☆215Updated last month
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆93Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- Utilities for obfuscating shellcode☆96Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆100Updated 8 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated last year
- Collection of random RedTeam scripts.☆211Updated last year
- ☆74Updated 6 months ago
- ☆123Updated 4 years ago
- Lateral Movement☆125Updated 2 years ago
- ☆223Updated 2 years ago
- My implementation of the GIUDA project in C++☆188Updated 2 years ago
- ☆121Updated last year