cube0x0 / BofRoastLinks
Beacon Object Files for roasting Active Directory
☆232Updated 3 years ago
Alternatives and similar repositories for BofRoast
Users that are interested in BofRoast are comparing it to the libraries listed below
Sorting:
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆210Updated last year
- Beacon Object File & C# project to check LDAP signing☆193Updated last year
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆299Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆300Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆142Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆141Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆246Updated 4 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- C# Lsass parser☆297Updated 4 years ago
- A BOF to automate common persistence tasks for red teamers☆289Updated 2 years ago
- ☆250Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆281Updated 4 years ago
- ☆156Updated 8 months ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆158Updated last year
- Hookers are cooler than patches.☆170Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆242Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆226Updated 2 years ago
- C# version of Powermad☆168Updated last year
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆449Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆168Updated last year
- Recovering NTLM hashes from Credential Guard☆349Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆306Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆343Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆140Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 3 years ago
- Simple C# implementation of PowerUpSQL☆94Updated last year
- Proof-of-concept tools for my AD Forest trust research☆223Updated last year