S3cur3Th1sSh1t / My-starred-Repositories
This is my starred repositories including the description for each tool. Makes search/filter over them easier.
☆41Updated last month
Alternatives and similar repositories for My-starred-Repositories:
Users that are interested in My-starred-Repositories are comparing it to the libraries listed below
- ☆54Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- ☆103Updated last month
- Lifetime AMSI bypass.☆35Updated 9 months ago
- A python script that automates a C2 Profile build☆22Updated last week
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Sniffing files generator☆55Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 9 months ago
- Enumerate Domain Users Without Authentication☆30Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆82Updated 2 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- ☆59Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated last month
- A C# project that builds a Web Applciation which redirects all HTTPS☆24Updated last month
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆69Updated 10 months ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- ☆49Updated 4 months ago
- ☆37Updated last month
- in-process powershell runner for BRC4☆44Updated last year
- Click Once + App Domain☆62Updated last year
- ☆53Updated 5 months ago
- TokenCert☆94Updated 4 months ago
- ☆71Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago