☆41Feb 20, 2025Updated last year
Alternatives and similar repositories for AWSRoundRobin
Users that are interested in AWSRoundRobin are comparing it to the libraries listed below
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- ☆58Feb 16, 2025Updated last year
- ☆127Dec 12, 2025Updated 2 months ago
- ☆146Nov 6, 2025Updated 4 months ago
- ☆55May 31, 2025Updated 9 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- ☆31Aug 13, 2025Updated 6 months ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆41Nov 4, 2025Updated 4 months ago
- A persistent database + CLI for your BBOT scan data 🧡☆42Updated this week
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- ☆139Jan 16, 2025Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆97Jan 21, 2026Updated last month
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆134Aug 23, 2025Updated 6 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆423Sep 29, 2025Updated 5 months ago
- ☆22Dec 30, 2025Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- ☆198Mar 28, 2025Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year