a7t0fwa7 / DllDragonLinks
A simple to use single-include Windows API resolver
☆23Updated last year
Alternatives and similar repositories for DllDragon
Users that are interested in DllDragon are comparing it to the libraries listed below
Sorting:
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- ☆49Updated 2 years ago
- ☆14Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Nemesis agent for Mythic☆28Updated last month
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- ☆18Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- ☆20Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Updated 10 months ago
- ☆17Updated 2 years ago
- ☆23Updated last year
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- ☆53Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Command and Control Framework using powershell implants☆35Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Updated 2 years ago
- ☆19Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago