gabriel-sztejnworcel / pipe-interceptView external linksLinks
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆280Sep 18, 2025Updated 4 months ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below
Sorting:
- A tool that shows detailed information about named pipes in Windows☆732Nov 15, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 6 months ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Nov 2, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 6 months ago
- ☆160Jan 27, 2025Updated last year
- Amazing whoami alternatives☆141Mar 23, 2024Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆555Nov 1, 2025Updated 3 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- ☆106Aug 21, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆612Jan 2, 2025Updated last year
- Exploring RPC interfaces on Windows☆344Jan 30, 2024Updated 2 years ago
- ☆100Oct 7, 2023Updated 2 years ago
- You shall pass☆271Jul 16, 2022Updated 3 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- The Token Stealer☆510Jul 13, 2022Updated 3 years ago
- TartarusGate, Bypassing EDRs☆651Jan 25, 2022Updated 4 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- A sock, with a wire, so you can tunnel all you desire.☆295Jan 19, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 6 months ago
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆273Dec 27, 2024Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,628Aug 6, 2022Updated 3 years ago
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆368Feb 1, 2026Updated 2 weeks ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆325Oct 20, 2025Updated 3 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year