Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆283Sep 18, 2025Updated 7 months ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that shows detailed information about named pipes in Windows☆743Nov 15, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- ☆160Jan 27, 2025Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆574Nov 1, 2025Updated 6 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆450Nov 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a tool used to analyze and monitor in named pipes☆196Oct 27, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Apr 24, 2026Updated last week
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆308Mar 28, 2026Updated last month
- Collection of remote authentication triggers in C#☆528May 15, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Amazing whoami alternatives☆141Mar 23, 2024Updated 2 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Exploring RPC interfaces on Windows☆351Jan 30, 2024Updated 2 years ago
- Tools for interacting with authentication packages using their individual message protocols☆433Apr 1, 2026Updated last month
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,633Jul 10, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 9 months ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- ☆490Nov 20, 2022Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- ☆108Aug 21, 2024Updated last year
- ☆53Sep 16, 2021Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- ☆102Oct 7, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆575Nov 23, 2025Updated 5 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆625Jan 2, 2025Updated last year
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- ☆430Apr 22, 2025Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,642Aug 6, 2022Updated 3 years ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 8 months ago