TheMagicClaw / LOLAPILinks
Living Off The Land API
☆43Updated this week
Alternatives and similar repositories for LOLAPI
Users that are interested in LOLAPI are comparing it to the libraries listed below
Sorting:
- ☆55Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- WMI Explorer☆75Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Updated last month
- Group Policy Objects manipulation and exploitation framework☆288Updated 2 months ago
- Our Tips&Tricks☆128Updated 11 months ago
- PoC that downloads an executable from a public SSL certificate☆136Updated 6 months ago
- Persist like a Dodder☆67Updated 8 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 6 months ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆88Updated last week
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- ☆96Updated 6 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Updated this week
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆68Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 7 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Updated 4 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 5 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Updated 6 months ago