A C# utility for interacting with SCOM
☆100Dec 2, 2025Updated 5 months ago
Alternatives and similar repositories for SharpSCOM
Users that are interested in SharpSCOM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆175May 8, 2026Updated last week
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- Cobalt Strike BOF☆56Dec 10, 2025Updated 5 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆56Apr 1, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- KslDump — Why bring your own knife when Defender already left one in the kitchen?☆333Apr 13, 2026Updated last month
- a minimalistic winrm client written in python☆44Apr 17, 2026Updated last month
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 3 months ago
- ☆19Jan 8, 2026Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 6 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆55May 12, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows Session Hijacking via COM☆348Dec 13, 2025Updated 5 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 8 months ago
- Library of BOFs to interact with SQL servers☆237Dec 3, 2025Updated 5 months ago
- A BOF that's a BOF Loader and more☆205Apr 6, 2026Updated last month
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 5 months ago
- System Call Integrity Layer - experimental security research☆27Apr 14, 2026Updated last month
- MDE/MDI Defender setup for Ludus☆57Mar 14, 2026Updated 2 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- dcsync bof☆52Feb 13, 2026Updated 3 months ago
- ☆133Jan 23, 2025Updated last year
- ☆54May 31, 2025Updated 11 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆453Nov 3, 2025Updated 6 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- A practical client for ADWS in Golang.☆52Mar 3, 2026Updated 2 months ago
- Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime☆91Mar 29, 2026Updated last month
- Shellcode injection using the Windows Debugging API☆177Jan 4, 2026Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Lab research on Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.☆235May 4, 2026Updated 2 weeks ago
- CAPSlock is an offline Conditional Access (CA) analysis tool built on top of a roadrecon database. It helps defenders, auditors, and red …☆71May 7, 2026Updated last week
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 4 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆354Apr 28, 2026Updated 3 weeks ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated last year