dsnezhkov / shutter
☆115Updated 3 years ago
Alternatives and similar repositories for shutter:
Users that are interested in shutter are comparing it to the libraries listed below
- Adversary Emulation Framework☆92Updated 8 months ago
- Living Off the Foreign Land setup scripts☆65Updated 3 weeks ago
- Tool for viewing NTDS.dit☆150Updated last week
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆79Updated 2 years ago
- ☆103Updated last month
- Simple BOF to read the protection level of a process☆115Updated last year
- Python module for running BOFs☆70Updated last year
- Do some DLL SideLoading magic☆79Updated last year
- ☆72Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆141Updated 10 months ago
- Rusty Impersonate☆95Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago
- AzureAD beacon object files☆117Updated 3 months ago
- Implant drop-in for EDR testing☆135Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- ☆150Updated 3 months ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago
- ☆125Updated last month
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago
- ☆133Updated last year
- ☆96Updated 2 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- ☆87Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆112Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year