djhohnstein / WireTap
.NET 4.0 Project to interact with video, audio and keyboard hardware.
☆212Updated 5 years ago
Alternatives and similar repositories for WireTap:
Users that are interested in WireTap are comparing it to the libraries listed below
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆169Updated 5 years ago
- SMBExec C# module☆217Updated 4 years ago
- ☆133Updated 4 years ago
- dem sharp donuts☆188Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 4 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆191Updated 5 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆284Updated 4 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆199Updated 4 years ago
- Miscellaneous Tools☆264Updated 4 years ago
- ☆278Updated 4 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆151Updated 6 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆110Updated 4 years ago
- ☆350Updated 3 years ago
- Create a minidump of the LSASS process from memory☆256Updated 2 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆262Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆267Updated last year
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆197Updated 3 years ago
- .NET Project for performing Authenticated Remote Execution☆393Updated 2 years ago
- ☆182Updated 4 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆178Updated 6 months ago
- Find specific users in active directory via their username and logon IP address☆380Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆193Updated 4 years ago
- ☆210Updated 4 years ago
- Cobalt Strike Aggressor Scripts☆139Updated 3 months ago
- Spray a hash via smb to check for local administrator access☆141Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆216Updated 2 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Updated 5 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆186Updated 4 years ago