☆67Dec 19, 2018Updated 7 years ago
Alternatives and similar repositories for SharpNado
Users that are interested in SharpNado are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆183Feb 21, 2022Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆350Feb 21, 2022Updated 4 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool to create hidden registry keys.☆489Oct 23, 2019Updated 6 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Modular rootkit framework.☆31Mar 26, 2021Updated 5 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Sep 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆281Dec 30, 2020Updated 5 years ago
- ☆110May 14, 2018Updated 7 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110May 24, 2020Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year