ajm4n / DLLHound
Find potential DLL Sideloads on your windows computer
☆162Updated 2 weeks ago
Alternatives and similar repositories for DLLHound:
Users that are interested in DLLHound are comparing it to the libraries listed below
- ☆185Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆191Updated 6 months ago
- C2 Infrastructure Automation☆92Updated last month
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆263Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆147Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆149Updated 3 weeks ago
- A BloodHound collector for Microsoft Configuration Manager☆261Updated last week
- An interactive shell to spoof some LOLBins command line☆181Updated 11 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆175Updated 2 months ago
- ☆136Updated 3 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆181Updated 3 weeks ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆179Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆234Updated last month
- ☆197Updated 3 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆181Updated 3 weeks ago
- ☆186Updated 9 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆132Updated 2 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆150Updated 4 months ago
- Retired TrustedSec Capabilities☆242Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆250Updated last year
- Python utility that generates "imageless" QR codes in various formats☆105Updated 4 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆235Updated 5 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆158Updated last year
- Malware As A Service☆119Updated 10 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆173Updated 3 months ago
- ☆148Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆106Updated 8 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 4 months ago
- ☆131Updated 4 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆101Updated last year