gabriel-sztejnworcel / pipe-interceptLinks
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆280Updated 3 months ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below
Sorting:
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- ☆223Updated 2 years ago
- Fully modular persistence framework☆258Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆352Updated 3 years ago
- Apply a divide and conquer approach to bypass EDRs☆287Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆233Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆196Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Bring your own print driver privilege escalation tool☆260Updated 4 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- ☆120Updated 8 months ago
- ☆194Updated 3 years ago
- ☆187Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆419Updated last year
- Bypassing AppLocker with C#☆143Updated 4 years ago
- ☆209Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆99Updated 3 years ago
- ☆184Updated 3 years ago
- ☆214Updated last month
- ☆385Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆80Updated 2 years ago
- PowerShell Obfuscation and Data Science☆181Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- ☆68Updated 3 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago