almounah / silphLinks
Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall
☆127Updated last month
Alternatives and similar repositories for silph
Users that are interested in silph are comparing it to the libraries listed below
Sorting:
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆238Updated 3 months ago
- Group Policy Objects manipulation and exploitation framework☆289Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆109Updated last week
- Adversary Emulation Framework☆129Updated 7 months ago
- ☆160Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆168Updated last year
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Updated this week
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆151Updated last month
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆108Updated 3 weeks ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆184Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- ☆230Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆212Updated last year
- Stage 0☆169Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Updated last year
- Python based GUI for browsing LDAP☆179Updated 2 months ago
- C2 Infrastructure Automation☆117Updated 7 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- The Azure Execution Tool☆83Updated this week
- BloodHound PowerShell client☆76Updated 2 months ago
- ☆159Updated 9 months ago
- Find potential DLL Sideloads on your windows computer☆218Updated last year
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆233Updated this week
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- ☆235Updated last year
- ☆246Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago