PhrozenIO / Arcane
Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a cross-platform client (Python/QT6).
☆228Updated 4 months ago
Alternatives and similar repositories for Arcane:
Users that are interested in Arcane are comparing it to the libraries listed below
- A POC to disable TamperProtection and other Defender / MDE components☆197Updated 8 months ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆431Updated 3 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆225Updated last month
- Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a c…☆24Updated 4 months ago
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆256Updated 4 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆331Updated last month
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆193Updated last month
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆434Updated 2 months ago
- Assess the security of your Active Directory with few or all privileges.☆260Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆204Updated 2 months ago
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)☆65Updated last month
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆651Updated 3 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆193Updated last month
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆248Updated 6 months ago
- Different methods to get current username without using whoami☆173Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆101Updated last week
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆286Updated last year
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆306Updated 2 months ago
- Tools for interacting with authentication packages using their individual message protocols☆305Updated 2 weeks ago
- Abusing Intune for Lateral Movement over C2☆324Updated this week
- Protect your Domain Controllers by auditing and restricting LDAP requests☆149Updated last month
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆217Updated 6 months ago
- ☆356Updated 5 months ago
- Tool to remotely dump secrets from the Windows registry☆426Updated last month
- ☆283Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆186Updated 4 months ago
- ☆104Updated last year
- ☆164Updated 3 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆116Updated 2 weeks ago
- ☆529Updated 10 months ago