☆68Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for YubiKey-Relay
Users that are interested in YubiKey-Relay are comparing it to the libraries listed below
Sorting:
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- ☆39Sep 26, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 3 years ago
- ☆105Jul 31, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- python spraying tools based on impacket lib☆55Sep 6, 2022Updated 3 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- ☆25Jul 7, 2022Updated 3 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Beacon Object Files for roasting Active Directory☆236Feb 21, 2022Updated 4 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆68Jul 19, 2022Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆534Aug 1, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- ☆121Nov 21, 2024Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- ☆130Apr 25, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago