gabriel-sztejnworcel / pipe-intercept
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆170Updated 2 years ago
Alternatives and similar repositories for pipe-intercept:
Users that are interested in pipe-intercept are comparing it to the libraries listed below
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Fully modular persistence framework☆252Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆188Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆173Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆184Updated 4 years ago
- Rusty Impersonate☆95Updated last year
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- Execute PowerShell code at the antimalware-light protection level.☆140Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆217Updated 2 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆157Updated 2 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Apply a divide and conquer approach to bypass EDRs☆278Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆140Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Find .net assemblies locally☆108Updated 2 years ago
- ☆90Updated last month
- Bring your own print driver privilege escalation tool