XiaoliChan / Invoke-sAMSpoofing
CVE-2021-42287/CVE-2021-42278 exploits in powershell
☆37Updated 2 years ago
Alternatives and similar repositories for Invoke-sAMSpoofing:
Users that are interested in Invoke-sAMSpoofing are comparing it to the libraries listed below
- resource-based constrained delegation RBCD☆43Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- ☆45Updated 7 months ago
- dump lsass☆37Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- Csharp 反射加载dll☆39Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- ☆30Updated last year
- MSSQL CLR for pentest.☆54Updated last year
- ☆45Updated 3 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆21Updated 9 months ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 2 years ago
- desktop screenshot☆29Updated last year
- Cs-Sleep-Mask-Fiber☆17Updated 4 months ago
- More EFS coerced authentication method with PetitPotam.py☆22Updated last year
- command execute without 445 port☆52Updated 2 years ago
- ☆22Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- ☆15Updated last year
- ☆21Updated last year
- Exchange ProxyRelay POC☆37Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- This is learning to write windows 32 api instance code in the golang language☆41Updated 3 years ago
- Stop Windows Defender programmatically☆15Updated 3 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- creddump bypass AV☆41Updated 4 years ago
- ☆39Updated last year
- query specific user and login IP from remote machine☆17Updated 2 years ago