foxlox / hypobrychium
Duplicate not owned Token from Running Process
☆72Updated last year
Related projects ⓘ
Alternatives and complementary repositories for hypobrychium
- ☆91Updated 8 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆53Updated 6 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆62Updated last year
- Lateral Movement☆118Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- C# havoc implant☆96Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆77Updated 3 weeks ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- ☆24Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 10 months ago
- ☆77Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- Small project to facilitate creation of .lnk payloads☆62Updated last year
- PoC-Malware-TTPs☆48Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆57Updated 4 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆87Updated 9 months ago
- ☆52Updated 7 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Lateral Movement via the .NET Profiler☆73Updated 5 months ago
- Just another C2 Redirector using CloudFlare.☆78Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 10 months ago