Sq00ky / SMB-Session-SpoofingLinks
☆123Updated last year
Alternatives and similar repositories for SMB-Session-Spoofing
Users that are interested in SMB-Session-Spoofing are comparing it to the libraries listed below
Sorting:
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- ☆118Updated 2 months ago
- ☆99Updated 3 years ago
- Shellcode generation and encoding utility☆23Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆94Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆230Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆47Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆84Updated 3 years ago
- ☆140Updated last year
- Get Fine Grained Password Policy☆70Updated 2 months ago
- ☆160Updated 7 months ago
- ☆248Updated last year