gabriel-sztejnworcel / pipe-interceptLinks
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆280Updated 4 months ago
Alternatives and similar repositories for pipe-intercept
Users that are interested in pipe-intercept are comparing it to the libraries listed below
Sorting:
- ☆225Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆288Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Updated 3 years ago
- ☆190Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆82Updated 2 years ago
- ☆120Updated 10 months ago
- Recovering NTLM hashes from Credential Guard☆373Updated 3 years ago
- DPAPILAB Next Gen, script collection☆93Updated 3 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 7 months ago
- Fully modular persistence framework☆259Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆198Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆101Updated 3 years ago
- Rusty Impersonate☆106Updated 3 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- ☆184Updated 3 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 4 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Updated 2 years ago
- ☆103Updated last week
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Updated 3 years ago
- ☆197Updated 5 months ago
- ☆159Updated 11 months ago
- Buggy script to play with GPOs☆121Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Collection of random RedTeam scripts.☆211Updated last year