☆36Dec 4, 2025Updated 2 months ago
Alternatives and similar repositories for SCOMHound
Users that are interested in SCOMHound are comparing it to the libraries listed below
Sorting:
- dcsync bof☆44Feb 13, 2026Updated 2 weeks ago
- Fast file copy over WinRM protocol for Go clients☆10Jan 15, 2026Updated last month
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 5 months ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 6 months ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 3 years ago
- ☆18Sep 1, 2025Updated 6 months ago
- A tools for terminal☆15Jul 15, 2024Updated last year
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated last month
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated 3 weeks ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Nov 2, 2025Updated 3 months ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 2 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- ☆26Aug 5, 2025Updated 6 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Updated this week
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆23Apr 22, 2020Updated 5 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 9 months ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆27Jun 13, 2024Updated last year
- ☆23Aug 31, 2022Updated 3 years ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆166Jan 12, 2026Updated last month
- Lateral Movement Bof with MSI ODBC Driver Install☆144Sep 30, 2025Updated 5 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆164Jan 23, 2026Updated last month
- ☆36May 27, 2024Updated last year
- Learn MongoDB from absolute basics.☆54Jan 16, 2026Updated last month
- A lightweight Windows Prefetch file parser to extract programs' execution history☆66Jan 12, 2026Updated last month
- ☆140Sep 9, 2025Updated 5 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆29May 29, 2024Updated last year
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Jun 24, 2021Updated 4 years ago