Yeeb1 / SharpRDPlusSnatcher
Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials used in remote desktop sessions.
☆16Updated 11 months ago
Alternatives and similar repositories for SharpRDPlusSnatcher:
Users that are interested in SharpRDPlusSnatcher are comparing it to the libraries listed below
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆72Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆38Updated 6 months ago
- ☆52Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 9 months ago
- ☆93Updated 11 months ago
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 10 months ago
- ☆39Updated 3 weeks ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Impacket pre-compiled binaries☆15Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Certipy in Docker☆11Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated last month
- ☆13Updated last month
- A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike.☆13Updated 10 months ago
- Adversary Emulation Framework☆65Updated 6 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆79Updated 4 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated 2 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated last month
- Enumerate Domain Users Without Authentication☆30Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆68Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- ☆45Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- ☆54Updated 3 months ago