PhrozenIO / ArcaneLinks
Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a cross-platform client (Python/QT6).
☆259Updated 8 months ago
Alternatives and similar repositories for Arcane
Users that are interested in Arcane are comparing it to the libraries listed below
Sorting:
- Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a c…☆30Updated 8 months ago
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆261Updated 7 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆666Updated 7 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆220Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆371Updated 4 months ago
- Rapidly initialize Windows Sanbox for malware analysis and reverse engineering☆134Updated 3 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆359Updated 5 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Updated 10 months ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆444Updated 7 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆237Updated 5 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆361Updated 3 weeks ago
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)☆80Updated 4 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆537Updated 2 weeks ago
- ☆219Updated 2 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆293Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆180Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆336Updated 2 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆227Updated 2 months ago
- Active Directory delegation management tool☆299Updated 2 years ago
- A PowerShell console in C/C++ with all the security features disabled☆244Updated 2 weeks ago
- ☆382Updated last month
- Monitor changes in Active Directory with replication metadata☆89Updated 10 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆306Updated 6 months ago
- ☆174Updated 6 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆289Updated 10 months ago
- Tool to remotely dump secrets from the Windows registry☆460Updated 3 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆179Updated last year
- Microsoft Signed PowerShell scripts☆214Updated 2 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆102Updated 9 months ago
- COM ViewLogger — new malware keylogging technique☆381Updated 5 months ago