dirkjanm / Group3r
Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
☆10Updated 2 years ago
Alternatives and similar repositories for Group3r:
Users that are interested in Group3r are comparing it to the libraries listed below
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- ☆45Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆83Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- ☆27Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- ☆41Updated 7 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- ☆24Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Research into WinSxS binaries and finding hijackable paths☆26Updated 9 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆73Updated 2 years ago
- C# Port of LdapRelayScan☆79Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- ☆88Updated 2 years ago
- ☆33Updated 3 weeks ago
- Implementation of SpoolSample without rDLL☆28Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 6 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆56Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆24Updated 6 months ago
- ☆12Updated 4 years ago
- ☆35Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆18Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago