☆121Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for SMB-Session-Spoofing
Users that are interested in SMB-Session-Spoofing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 4 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- ☆490Nov 20, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆202Aug 7, 2024Updated last year
- ☆145Oct 31, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Dumping LSASS with a duplicated handle from custom LSA plugin☆206Feb 23, 2022Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆248Feb 23, 2022Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆347Jan 22, 2025Updated last year
- Dump the memory of a PPL with a userland exploit☆892Jul 24, 2022Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆115Apr 4, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆218Mar 30, 2022Updated 4 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆419Jan 27, 2024Updated 2 years ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 3 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Jul 4, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆443Jan 4, 2025Updated last year
- ☆255Sep 28, 2023Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆132Apr 6, 2022Updated 4 years ago
- Framework for Kerberos relaying☆947May 29, 2022Updated 3 years ago
- ☆836Sep 9, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- COM Hijacking VOODOO☆382Nov 27, 2025Updated 5 months ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated 2 weeks ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Apr 8, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof-of-concept tools for my AD Forest trust research☆235Jun 10, 2024Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- ACL abuse swiss-knife☆129Feb 3, 2023Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆91Feb 16, 2022Updated 4 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,382Mar 9, 2026Updated last month
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆104May 6, 2024Updated 2 years ago