Sq00ky / SMB-Session-SpoofingView external linksLinks
☆121Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for SMB-Session-Spoofing
Users that are interested in SMB-Session-Spoofing are comparing it to the libraries listed below
Sorting:
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆386Apr 16, 2022Updated 3 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆113May 16, 2022Updated 3 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Feb 23, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Mar 30, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- ☆144Oct 31, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- Finding secrets in kernel and user memory☆116Sep 6, 2023Updated 2 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆502Jan 25, 2022Updated 4 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆891Jul 24, 2022Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆248Feb 23, 2022Updated 3 years ago
- BOF combination of KillDefender and Backstab☆170Mar 23, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- "Golden" certificates☆710Aug 17, 2024Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Jan 31, 2025Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆439Jan 4, 2025Updated last year
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 3 months ago
- ☆30Nov 7, 2022Updated 3 years ago
- COM Hijacking VOODOO☆376Nov 27, 2025Updated 2 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Jul 16, 2021Updated 4 years ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆217Jan 18, 2023Updated 3 years ago