A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup
☆37Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for SharpLeftOvers
Users that are interested in SharpLeftOvers are comparing it to the libraries listed below
Sorting:
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- C# Utilities for Windows Notification Facility☆159Apr 14, 2025Updated 11 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- ☆207Feb 24, 2022Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆186Oct 3, 2021Updated 4 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆141Feb 24, 2022Updated 4 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- COFF and BOF Loader written in Nim☆174Aug 1, 2022Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- LDAP Querying without the Suck☆111Nov 9, 2024Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago