S3cur3Th1sSh1t / SharpByeBear
AppXSVC Service race condition - privilege escalation
☆27Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for SharpByeBear
- ☆16Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Get or remove RunMRU values☆52Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆25Updated last year
- Extended Process List (Search functionality)☆27Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 3 years ago
- ☆36Updated 3 years ago
- ☆37Updated 6 years ago
- ☆28Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆34Updated last year
- ☆23Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- treafik fronted c2 examples☆26Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆26Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆26Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆26Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 8 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Execute Mimikatz with different technique☆50Updated 3 years ago
- C# port of LogServiceCrash☆45Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago