byinarie / teams_dump
PoC for dumping and decrypting cookies in the latest version of Microsoft Teams
☆126Updated 10 months ago
Related projects: ⓘ
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- Abuse leaked token handles.☆129Updated 9 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆157Updated last year
- ☆131Updated 3 months ago
- Continuous password spraying tool☆112Updated 3 months ago
- Execute shellcode files with rundll32☆171Updated 7 months ago
- ☆155Updated 10 months ago
- ☆110Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- Lateral Movement☆117Updated 10 months ago
- Weaponized HellsGate/SigFlip☆188Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆136Updated last month
- ☆119Updated last month
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆105Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- ☆125Updated 8 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- ☆174Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆59Updated 3 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 11 months ago
- ☆103Updated 5 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆171Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆77Updated last year
- Just another C2 Redirector using CloudFlare.☆76Updated 4 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆81Updated 3 weeks ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆91Updated last year
- ☆138Updated this week