SYANiDE- / SuperSharpShooterLinks
Payload Generation Framework
☆93Updated last year
Alternatives and similar repositories for SuperSharpShooter
Users that are interested in SuperSharpShooter are comparing it to the libraries listed below
Sorting:
- ☆34Updated 4 years ago
- A collection of code snippets built to assist with breaking chains.☆123Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆124Updated 2 years ago
- ☆214Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- Attempt at Obfuscated version of SharpCollection☆223Updated last week
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆61Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆91Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆96Updated 4 years ago
- AV Evasion Techniques☆79Updated 3 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆117Updated last year
- ☆210Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆365Updated last year
- pysnaffler☆104Updated 2 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Shellcode generation and encoding utility☆23Updated 3 years ago
- ☆153Updated 7 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 6 months ago
- Patch AMSI and ETW☆246Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆263Updated last month
- ☆227Updated last year
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- Payload Generation Framework☆20Updated last year
- Malware As A Service☆135Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆268Updated 4 months ago
- ☆195Updated 2 months ago
- ☆183Updated 4 months ago
- ☆71Updated 7 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆295Updated 2 years ago