ajm4n / TermHound
☆25Updated 3 months ago
Alternatives and similar repositories for TermHound:
Users that are interested in TermHound are comparing it to the libraries listed below
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- SAM Dumping in C#☆41Updated last month
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- ☆51Updated last month
- Click Once + App Domain☆62Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆44Updated last month
- ☆63Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆25Updated 8 months ago
- ProcExp Driver (Ab)use☆20Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆46Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 10 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- A care package of useful bofs for red team engagments☆54Updated 2 months ago
- A VSCode plugin to assist with BOF development.☆33Updated 6 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Sliver agent rewritten in C++☆44Updated 5 months ago
- ☆93Updated 5 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 4 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆69Updated 3 weeks ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆76Updated 3 months ago
- ☆24Updated 2 years ago
- Execute dotnet app from unmanaged process☆69Updated last month
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆37Updated last year
- Execute commands in other Sessions☆84Updated 6 months ago