eladshamir / RPC-Backdoor
A basic emulation of an "RPC Backdoor"
☆208Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for RPC-Backdoor
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆227Updated last year
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- Remove API hooks from a Beacon process.☆262Updated 3 years ago
- You shall pass☆249Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆173Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆169Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆153Updated 10 months ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆292Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆178Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆76Updated 2 years ago
- A BOF to determine Windows Defender exclusions.☆240Updated last year
- A BOF to automate common persistence tasks for red teamers☆266Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago
- AV/EDR evasion via direct system calls.☆106Updated 11 months ago
- ☆139Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆134Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆138Updated 8 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆173Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- ☆112Updated 2 years ago
- ☆89Updated 2 years ago
- ☆181Updated last year
- Pass the Hash to a named pipe for token Impersonation☆294Updated 11 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year