Semperis / SAMLSmithLinks
☆87Updated 3 months ago
Alternatives and similar repositories for SAMLSmith
Users that are interested in SAMLSmith are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- Utilizng an MCP Server to communicate with your C2☆85Updated 6 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 5 months ago
- Enumerate active EDR's on the system☆144Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆96Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆104Updated 3 weeks ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 2 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆123Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆85Updated last week
- A simple POC to expose Mythic as a MCP server☆73Updated 7 months ago
- Persist like a Dodder☆66Updated 5 months ago
- A red teaming attack paradigm against AI Agents☆32Updated 8 months ago
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 3 months ago
- Orsted C2 Framework☆87Updated this week
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆114Updated 2 weeks ago
- Java archive implant toolkit.☆61Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆101Updated last year
- Permanently disable EDRs as local admin☆121Updated last month
- Source code and examples for PassiveAggression☆64Updated last year
- GitLab Attack TOolkit☆28Updated last month
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆236Updated last week
- ☆85Updated 5 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 3 months ago
- SCEP request tool for AD CS and Intune☆70Updated 3 weeks ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 9 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆136Updated last week
- Detect WFP filters blocking EDR communications☆94Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago