gabriel-sztejnworcel / pipe-interceptLinks
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆177Updated 2 years ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below
Sorting:
- Recovering NTLM hashes from Credential Guard☆339Updated 2 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- ☆386Updated 2 months ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆406Updated last year
- ☆380Updated 2 years ago
- Bring your own print driver privilege escalation tool☆253Updated 3 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆323Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆392Updated last year
- ☆184Updated 2 years ago
- ☆190Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Dump stuff without touching disk☆164Updated 4 years ago
- Fully modular persistence framework☆255Updated 2 years ago
- ☆92Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆223Updated 2 years ago
- C# Lsass parser☆295Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆299Updated 2 years ago
- Koppeling x Metatwin x LazySign☆213Updated 3 years ago
- ☆391Updated 4 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆252Updated last year
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆189Updated 3 years ago
- Leaked Windows processes handles identification tool☆288Updated 3 years ago
- Bypassing AppLocker with C#☆141Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆366Updated 3 years ago