codewhitesec / Lastenzug
Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level
☆212Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Lastenzug
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago
- You shall pass☆249Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆281Updated last year
- Patch AMSI and ETW☆232Updated 6 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- Coerce Windows machines auth via MS-EVEN☆153Updated 10 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆170Updated last year
- ADCS cert template modification and ACL enumeration☆129Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆227Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆169Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆138Updated 8 months ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆154Updated 2 years ago
- C# version of Powermad☆156Updated 11 months ago
- My implementation of the GIUDA project in C++☆159Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆313Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆178Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆327Updated last year
- ☆295Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- EDRSandblast-GodFault☆240Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆281Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- ☆143Updated last year
- Simple BOF to read the protection level of a process☆104Updated last year
- ☆181Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆346Updated 2 years ago
- ☆160Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆184Updated 3 years ago