☆32Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for LabS4U2Self
Users that are interested in LabS4U2Self are comparing it to the libraries listed below
Sorting:
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆247Apr 4, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- ☆48Feb 11, 2023Updated 3 years ago
- More examples using the Impacket library designed for learning purposes.☆264Nov 4, 2022Updated 3 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Interact with Windows RPC Services over SMB using go-smb☆11Feb 27, 2026Updated 3 weeks ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- ☆242Nov 21, 2024Updated last year
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- ☆414Nov 18, 2022Updated 3 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- A simple website to act as a store for havoc modules and extensions☆29Jan 20, 2025Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆359Mar 2, 2024Updated 2 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆65Jan 5, 2026Updated 2 months ago
- C++ WinRM API via Reflective DLL☆145Sep 11, 2021Updated 4 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆418Jan 27, 2024Updated 2 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- ☆88Jul 31, 2022Updated 3 years ago