Yeeb1 / SharpRDPlusSnatcher
Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials used in remote desktop sessions.
☆14Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for SharpRDPlusSnatcher
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆33Updated last month
- Impacket pre-compiled binaries☆13Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆57Updated 2 months ago
- ☆25Updated 2 months ago
- ☆40Updated last week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆36Updated last month
- ☆68Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆77Updated 3 weeks ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 3 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆38Updated last month
- ☆43Updated 4 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- ☆83Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆130Updated last month
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 5 months ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 3 weeks ago
- Bypassing Amsi using LdrLoadDll☆20Updated 2 weeks ago
- ☆33Updated 3 weeks ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆31Updated 7 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Enumerate the Domain for Readable and Writable Shares☆15Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 4 months ago