PhrozenIO / SharpShellPipeLinks
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
☆119Updated 4 months ago
Alternatives and similar repositories for SharpShellPipe
Users that are interested in SharpShellPipe are comparing it to the libraries listed below
Sorting:
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆134Updated 9 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆142Updated last year
- ☆88Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- C# havoc implant☆100Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆149Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆58Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆84Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- C# Port of LdapRelayScan☆85Updated 3 years ago
- Terminate AV/EDR leveraging BYOVD attack☆87Updated 3 months ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆159Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆81Updated last year
- ☆89Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆184Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- ☆100Updated last year
- ☆88Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- ☆68Updated last month
- ☆128Updated last year