cyndicatelabs / GodPotato_CLRLinks
A Custom CLR Assembly for MSSQL of the popular tool GodPotato
☆79Updated 2 years ago
Alternatives and similar repositories for GodPotato_CLR
Users that are interested in GodPotato_CLR are comparing it to the libraries listed below
Sorting:
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆24Updated 2 years ago
- ☆24Updated 3 months ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆73Updated 3 weeks ago
- ASPX ShellCode Loader☆50Updated last year
- dump lsass tool☆38Updated 2 years ago
- Load shellcode via syscall☆55Updated 4 years ago
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆35Updated 2 weeks ago
- Cobalt Strike BOF that Add an admin user☆77Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- MSSQL CLR for pentest.☆54Updated last year
- ☆30Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆18Updated 2 months ago
- dump lsass☆37Updated 3 years ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- ☆46Updated last year
- 一个普通的BOF用来BypassUAC☆22Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 9 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- AddDefenderExclusions Beacon Object File☆41Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆90Updated last year