Manipulating and Abusing Windows Access Tokens.
☆290Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for TokenPlayer
Users that are interested in TokenPlayer are comparing it to the libraries listed below
Sorting:
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,008Jun 4, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,162Mar 31, 2021Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆174Jan 17, 2024Updated 2 years ago
- ☆511Aug 14, 2022Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆742Jul 22, 2023Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆714Mar 4, 2023Updated 3 years ago
- miscellaneous scripts and programs☆277Jan 23, 2025Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- Some notes and examples for cobalt strike's functionality☆1,127Feb 8, 2022Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆888Jul 24, 2022Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆628Oct 19, 2023Updated 2 years ago
- WTSRM☆216Aug 7, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,608Jul 10, 2023Updated 2 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆498Feb 3, 2022Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Threadless Process Injection using remote function hooking.☆810Sep 4, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆774Dec 21, 2022Updated 3 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆807Jul 6, 2020Updated 5 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆889Jul 21, 2020Updated 5 years ago
- ☆620Jul 21, 2025Updated 7 months ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- Remote operations commands implemented using Beacon Object Files☆1,139Mar 5, 2026Updated 2 weeks ago
- Sleep Obfuscation☆824Dec 3, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago