daddycocoaman / turdshovelLinks
Dump objects from .NET dumps.
☆51Updated 3 years ago
Alternatives and similar repositories for turdshovel
Users that are interested in turdshovel are comparing it to the libraries listed below
Sorting:
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- ☆37Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- ☆42Updated 3 years ago
- pypykatz plugin for volatility3 framework☆40Updated last month
- ☆25Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆38Updated last year
- ☆55Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- ☆59Updated 3 years ago
- Exchangelib wrapper for pentesting☆64Updated 5 months ago
- ☆23Updated 3 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Change up a binary's embedded resources with this little creature.☆34Updated 5 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆26Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- Simple .NET assembly to interact with services.☆41Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago