☆39Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for PIVert-Relay
Users that are interested in PIVert-Relay are comparing it to the libraries listed below
Sorting:
- ☆105Jul 31, 2024Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆300Mar 1, 2023Updated 3 years ago
- ☆160Feb 8, 2025Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Feb 13, 2023Updated 3 years ago
- ☆68Oct 17, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- Beacon Object Files for roasting Active Directory☆236Feb 21, 2022Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- ☆74Jun 17, 2025Updated 9 months ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Apr 18, 2022Updated 3 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- POC tools for exploring SMB over QUIC protocol☆130Apr 6, 2022Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆114May 16, 2022Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago