A C# utility for interacting with SCOM
☆96Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for SharpSCOM
Users that are interested in SharpSCOM are comparing it to the libraries listed below
Sorting:
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- ☆19Jan 8, 2026Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 4 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- Windows Session Hijacking via COM☆340Dec 13, 2025Updated 3 months ago
- MDE/MDI Defender setup for Ludus☆54Updated this week
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- Library of BOFs to interact with SQL servers☆227Dec 3, 2025Updated 3 months ago
- A BOF that's a BOF Loader and more☆200Jan 17, 2026Updated 2 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month
- Using Chromium-based browsers as a proxy for C2 traffic.☆147Dec 6, 2025Updated 3 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- ☆127Jan 23, 2025Updated last year
- ☆55May 31, 2025Updated 9 months ago
- ☆61Feb 12, 2026Updated last month
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆443Nov 3, 2025Updated 4 months ago
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 2 weeks ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆228Sep 19, 2025Updated 6 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆335Mar 11, 2026Updated last week
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆288Jan 12, 2026Updated 2 months ago