This tool exploits Golden DMSA attack against delegated Managed Service Accounts.
☆95Jul 15, 2025Updated 9 months ago
Alternatives and similar repositories for GoldenDMSA
Users that are interested in GoldenDMSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆98Apr 14, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆36Jan 23, 2025Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- Silver SAML forgery tool☆59Apr 14, 2026Updated 2 weeks ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Apr 17, 2026Updated 2 weeks ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 10 months ago
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆18Jul 1, 2025Updated 9 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ☆142Jun 21, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆116Jan 21, 2026Updated 3 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 8 months ago
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Apr 22, 2026Updated last week
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- BypassCredGuard CS BOF☆53Jan 23, 2025Updated last year
- kerberos in rust for fun and profit☆71Mar 13, 2026Updated last month
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A centralized list of the various Potato Windows exploits.☆22Mar 31, 2026Updated last month
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- Sleep obfuscation☆273Dec 13, 2024Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆464Feb 19, 2025Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago