S3cur3Th1sSh1t / NamedPipePTHView external linksLinks
Pass the Hash to a named pipe for token Impersonation
☆146May 1, 2021Updated 4 years ago
Alternatives and similar repositories for NamedPipePTH
Users that are interested in NamedPipePTH are comparing it to the libraries listed below
Sorting:
- Pass the Hash to a named pipe for token Impersonation☆313Nov 29, 2023Updated 2 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆830Dec 2, 2023Updated 2 years ago
- Get file less command execution for lateral movement.☆634Jun 3, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆447Jan 25, 2023Updated 3 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆180Apr 23, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆269Mar 18, 2021Updated 4 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago
- Retrieve LAPS password from LDAP☆433Feb 17, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆455Dec 23, 2020Updated 5 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- ☆360Apr 24, 2021Updated 4 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆499Oct 8, 2021Updated 4 years ago
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- A fake AMSI Provider which can be used for persistence.☆155May 16, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,438Dec 18, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆240Jun 9, 2023Updated 2 years ago
- Dump the memory of a PPL with a userland exploit☆892Jul 24, 2022Updated 3 years ago
- Suite of Shellcode Running Utilities☆114Jan 30, 2020Updated 6 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆187Jul 21, 2022Updated 3 years ago
- ☆345Sep 13, 2021Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- ☆132Jul 14, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago