A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup
☆38Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for SharpLeftOvers
Users that are interested in SharpLeftOvers are comparing it to the libraries listed below
Sorting:
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- C# Utilities for Windows Notification Facility☆159Apr 14, 2025Updated 10 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Jul 22, 2021Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆41Jul 5, 2023Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆71Mar 25, 2022Updated 3 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Aug 1, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- ☆208Feb 24, 2022Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Oct 3, 2021Updated 4 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Nov 1, 2022Updated 3 years ago
- LDAP Querying without the Suck☆110Nov 9, 2024Updated last year
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- using the gpu to hide your payload☆64Aug 15, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆142Feb 24, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- COFF and BOF Loader written in Nim☆175Aug 1, 2022Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago