SySS-Research / ldap-swakView external linksLinks
LDAP Swiss Army Knife
☆51Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for ldap-swak
Users that are interested in ldap-swak are comparing it to the libraries listed below
Sorting:
- A minimal DNS service that can provide spoofed replies☆102Apr 24, 2023Updated 2 years ago
- Simple shell script to "clone" X.509 certificates☆111Mar 31, 2025Updated 10 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- ☆26Feb 11, 2025Updated last year
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 2 months ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- A little implant which SSH's back with a shell☆38Feb 1, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆85Nov 20, 2022Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- Installs And Executes Shellcode☆11Jul 26, 2015Updated 10 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Apr 8, 2022Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Gets in the way of your victim's traffic and out of yours☆27Aug 4, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Search files for extensions as well as text within.☆120Sep 28, 2021Updated 4 years ago
- Escalate Service Account To LocalSystem via Kerberos☆402Sep 14, 2023Updated 2 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆81Nov 21, 2024Updated last year
- cobalt strike tools☆31Nov 4, 2021Updated 4 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago