gabriel-sztejnworcel / pipe-interceptLinks
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆276Updated 2 months ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below
Sorting:
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- ☆223Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆351Updated 2 years ago
- ☆188Updated last year
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- ☆209Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆231Updated 3 years ago
- ☆158Updated 9 months ago
- OPSEC safe Kerberoasting in C#☆193Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Updated 2 years ago
- ☆119Updated 8 months ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆183Updated 2 years ago
- ☆68Updated 3 years ago
- Apply a divide and conquer approach to bypass EDRs☆287Updated 2 years ago
- ☆418Updated 7 months ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 4 years ago
- Fully modular persistence framework☆257Updated 2 years ago
- Bring your own print driver privilege escalation tool☆260Updated 4 years ago
- A SOCKS proxy for Citrix.☆94Updated 2 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆230Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Updated last year
- Asynchronous RDP client for Python (headless)☆208Updated 3 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆131Updated 3 years ago