bohops / SharpRDPHijack
A POC Remote Desktop (RDP) session hijack utility for disconnected sessions
☆423Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SharpRDPHijack
- .NET Project for performing Authenticated Remote Execution☆379Updated last year
- Find specific users in active directory via their username and logon IP address☆374Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆428Updated last year
- ☆349Updated 3 years ago
- Various Cobalt Strike BOFs☆577Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆413Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆330Updated 3 years ago
- C# Lsass parser☆280Updated 3 years ago
- Cobalt Strike kit for Lateral Movement☆645Updated 4 years ago
- Run Powershell without software restrictions.☆278Updated 3 years ago
- ☆348Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆309Updated last year
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆465Updated 2 years ago
- A little tool to play with Outlook☆204Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆677Updated 2 months ago
- ☆441Updated last year
- Bypass AMSI by patching AmsiScanBuffer☆251Updated 3 years ago
- Collection of C# projects. Useful for pentesting and redteaming.☆297Updated last year
- Collection of remote authentication triggers in C#☆464Updated 5 months ago
- A tool to help query AD via the LDAP protocol☆453Updated last month
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆229Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆462Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆377Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆361Updated 2 years ago
- Cobalt Strike kit for Persistence☆464Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆298Updated 3 years ago
- C# tool for UAC bypasses☆410Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆401Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆323Updated 2 years ago