WKL-Sec / WMIExec
Set of python scripts which perform different ways of command execution via WMI protocol.
☆161Updated last year
Alternatives and similar repositories for WMIExec:
Users that are interested in WMIExec are comparing it to the libraries listed below
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆168Updated 4 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆290Updated 4 months ago
- ACL abuse swiss-knife☆119Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- ☆223Updated 10 months ago
- My implementation of the GIUDA project in C++☆180Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- ☆171Updated 4 months ago
- ☆116Updated last year
- Execute shellcode files with rundll32☆193Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆106Updated last year
- OPSEC safe Kerberoasting in C#☆190Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆175Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆178Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Lateral Movement☆123Updated last year
- ☆214Updated last year
- ☆158Updated 4 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆287Updated 4 months ago
- A C# port from Invoke-GhostTask☆113Updated last year
- ☆193Updated 11 months ago