cybersectroll / TrollDisappearKeyLinks
☆46Updated last week
Alternatives and similar repositories for TrollDisappearKey
Users that are interested in TrollDisappearKey are comparing it to the libraries listed below
Sorting:
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆47Updated 2 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- ☆107Updated 5 months ago
- TokenCert☆98Updated 8 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆94Updated 8 months ago
- ☆56Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆73Updated last year
- Sniffing files generator☆59Updated 4 months ago
- ☆111Updated 7 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 6 months ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆66Updated 6 months ago
- ☆68Updated 2 months ago
- Click Once + App Domain☆62Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆132Updated 5 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆114Updated last month
- ☆44Updated 2 weeks ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆59Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆47Updated 2 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆83Updated 10 months ago
- ☆50Updated 8 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆50Updated 6 months ago
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- ☆52Updated last month
- Find DLLs with RWX section☆81Updated 2 years ago