Ridter / atexec-pro
Fileless atexec, no more need for port 445
☆360Updated 11 months ago
Alternatives and similar repositories for atexec-pro:
Users that are interested in atexec-pro are comparing it to the libraries listed below
- ☆222Updated 10 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆237Updated 9 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆404Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆284Updated 3 months ago
- Attempt at Obfuscated version of SharpCollection☆205Updated 3 weeks ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆437Updated last month
- A beacon object file implementation of PoolParty Process Injection Technique.☆371Updated last year
- A Tool that aims to evade av with binary padding☆147Updated 8 months ago
- ☆322Updated last month
- COM Hijacking VOODOO☆268Updated this week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 7 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆310Updated 2 years ago
- ☆214Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆302Updated 11 months ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆128Updated 2 years ago
- ☆228Updated 4 months ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- ☆237Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆451Updated 8 months ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆370Updated 2 years ago
- A Windows potato to privesc☆353Updated 6 months ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- Terminate AV/EDR Processes using kernel driver☆340Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 5 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆282Updated 4 months ago