Manipulating and Abusing Windows Access Tokens.
☆295Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for TokenPlayer
Users that are interested in TokenPlayer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,015Jun 4, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆993Dec 4, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Coerce Windows machines auth via MS-EVEN☆175Jan 17, 2024Updated 2 years ago
- ☆514Aug 14, 2022Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆751Jul 22, 2023Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆721Mar 4, 2023Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- miscellaneous scripts and programs☆285May 13, 2026Updated last week
- Some notes and examples for cobalt strike's functionality☆1,138Feb 8, 2022Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dump the memory of a PPL with a userland exploit☆892Jul 24, 2022Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆630Oct 19, 2023Updated 2 years ago
- WTSRM☆216Aug 7, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆505Feb 3, 2022Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- A tool to kill antimalware protected processes☆1,514Jun 19, 2021Updated 4 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆625Sep 26, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- COFF file (BOF) for managing Kerberos tickets.☆326Jul 2, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆424May 21, 2022Updated 3 years ago
- Threadless Process Injection using remote function hooking.☆817Sep 4, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆778Dec 21, 2022Updated 3 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆819Jul 6, 2020Updated 5 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆905Jul 21, 2020Updated 5 years ago
- ☆2,187Apr 3, 2026Updated last month
- ☆636Jul 21, 2025Updated 9 months ago
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆489Jul 12, 2023Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆854Dec 2, 2023Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆448Jan 25, 2023Updated 3 years ago
- Remote operations commands implemented using Beacon Object Files☆1,157Mar 5, 2026Updated 2 months ago
- Sleep Obfuscation☆837Dec 3, 2023Updated 2 years ago
- ☆539Nov 20, 2021Updated 4 years ago