Manipulating and Abusing Windows Access Tokens.
☆290Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for TokenPlayer
Users that are interested in TokenPlayer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆991Dec 4, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Coerce Windows machines auth via MS-EVEN☆174Jan 17, 2024Updated 2 years ago
- ☆511Aug 14, 2022Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆744Jul 22, 2023Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆716Mar 4, 2023Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- A basic emulation of an "RPC Backdoor"☆241Aug 25, 2022Updated 3 years ago
- miscellaneous scripts and programs☆279Jan 23, 2025Updated last year
- Some notes and examples for cobalt strike's functionality☆1,129Feb 8, 2022Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆533Aug 1, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆629Oct 19, 2023Updated 2 years ago
- WTSRM☆215Aug 7, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆501Feb 3, 2022Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆405Feb 8, 2023Updated 3 years ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- COFF file (BOF) for managing Kerberos tickets.☆322Jul 2, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Threadless Process Injection using remote function hooking.☆808Sep 4, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆773Dec 21, 2022Updated 3 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆811Jul 6, 2020Updated 5 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆891Jul 21, 2020Updated 5 years ago
- ☆2,175Updated this week
- ☆627Jul 21, 2025Updated 8 months ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆845Dec 2, 2023Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆445Jan 25, 2023Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- Remote operations commands implemented using Beacon Object Files☆1,146Mar 5, 2026Updated last month
- Sleep Obfuscation☆824Dec 3, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago