Random
☆35Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Random
Users that are interested in Random are comparing it to the libraries listed below
Sorting:
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- ☆184Jul 2, 2022Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Feb 18, 2025Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A collection of Cobalt Strike aggressor scripts☆17Jul 7, 2020Updated 5 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Some random system tools for Windows☆115Apr 16, 2022Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆440Jan 4, 2025Updated last year
- ☆124May 12, 2021Updated 4 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆216Oct 8, 2020Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- .NET project for installing Persistence☆63Feb 14, 2022Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- More examples using the Impacket library designed for learning purposes.☆264Nov 4, 2022Updated 3 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- ☆79Aug 5, 2024Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Aug 1, 2022Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- A fake AMSI Provider which can be used for persistence.☆155May 16, 2021Updated 4 years ago