SYANiDE- / SuperSharpShooterLinks
Payload Generation Framework
☆93Updated last year
Alternatives and similar repositories for SuperSharpShooter
Users that are interested in SuperSharpShooter are comparing it to the libraries listed below
Sorting:
- ☆213Updated last year
- A collection of code snippets built to assist with breaking chains.☆123Updated last year
- ☆34Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆124Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆221Updated last month
- A variety of AV evasion techniques written in C# for practice.☆97Updated 4 years ago
- ☆152Updated 6 months ago
- Patch AMSI and ETW☆246Updated last year
- ☆204Updated last year
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- Shellcode generation and encoding utility☆23Updated 3 years ago
- AV Evasion Techniques☆79Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆124Updated 5 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆117Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆61Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆90Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆291Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆123Updated 4 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- ☆71Updated 6 months ago
- ☆182Updated 3 months ago
- ☆73Updated 8 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 5 months ago
- ☆227Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆267Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- ☆193Updated last month
- pysnaffler☆104Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆362Updated last year