dreamkinn / CompileCSDockerLinks
Compile SharpHound and others on Linux
☆24Updated last year
Alternatives and similar repositories for CompileCSDocker
Users that are interested in CompileCSDocker are comparing it to the libraries listed below
Sorting:
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆90Updated last year
- Windows protocol library, including SMB and RPC implementations, among others.☆216Updated this week
- C++ Reflective Assembly Loader☆28Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆143Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆163Updated 2 months ago
- Dump Kerberos tickets☆40Updated last month
- Utilities for obfuscating shellcode☆93Updated last week
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆159Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 5 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆133Updated last month
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆166Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆267Updated 2 months ago
- ☆95Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated 11 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆237Updated 3 weeks ago
- pysnaffler☆102Updated last month
- Adversary Emulation Framework☆122Updated 2 months ago
- ☆161Updated 8 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 5 months ago
- OAuth Device Code Phishing Toolkit☆88Updated 3 weeks ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆51Updated this week
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 3 months ago
- ☆58Updated 2 weeks ago
- ☆160Updated 3 months ago
- Build sneaky & malicious LNK files.☆146Updated 2 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆171Updated last week