djhohnstein / WireTapLinks
.NET 4.0 Project to interact with video, audio and keyboard hardware.
☆217Updated 5 years ago
Alternatives and similar repositories for WireTap
Users that are interested in WireTap are comparing it to the libraries listed below
Sorting:
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆174Updated 5 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Updated 5 years ago
- ☆135Updated 4 years ago
- SMBExec C# module☆216Updated 4 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Updated 10 months ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆195Updated 4 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Updated 3 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆200Updated 3 years ago
- Create a minidump of the LSASS process from memory☆261Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- Miscellaneous Tools☆267Updated 4 years ago
- Find specific users in active directory via their username and logon IP address☆384Updated 5 years ago
- ☆347Updated 3 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 4 years ago
- ☆162Updated 2 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- dem sharp donuts☆198Updated 2 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆134Updated last year
- Run Rubeus via Rundll32☆202Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆272Updated 2 years ago
- ☆281Updated 4 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆233Updated 2 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆192Updated 4 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Updated 5 years ago
- MSBuild Without MSBuild.exe☆157Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆329Updated 5 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 3 years ago
- CSHARP DCOM Fun☆130Updated 5 years ago