XMCyber / XMCredentialsDecryptorLinks
☆74Updated last year
Alternatives and similar repositories for XMCredentialsDecryptor
Users that are interested in XMCredentialsDecryptor are comparing it to the libraries listed below
Sorting:
- Dump document encryption password from Office process memory☆39Updated 2 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆52Updated last year
- Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3…☆28Updated 4 years ago
- ☆80Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆27Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- Winsocket for Cobalt Strike.☆101Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Perform DCSync operation without mimikatz☆152Updated last year
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆80Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆51Updated 3 years ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆21Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 8 months ago
- C# binary with embeded golang hack-browser-data☆99Updated 3 years ago
- ☆46Updated last year
- Silently Install Chrome Extension For Persistence☆95Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 3 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆61Updated 9 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- DCSync Attack from Outside using Impacket☆116Updated 3 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆68Updated 3 months ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year