gh0x0st / wanderer
An open-source process injection enumeration tool written in C#
☆171Updated 2 years ago
Alternatives and similar repositories for wanderer
Users that are interested in wanderer are comparing it to the libraries listed below
Sorting:
- ☆220Updated last year
- ☆165Updated 2 years ago
- Patch AMSI and ETW☆239Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- (Demo) 3rd party agent for Havoc☆139Updated last year
- ☆117Updated last month
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- Weaponized HellsGate/SigFlip☆199Updated last year
- Attempt at Obfuscated version of SharpCollection☆207Updated last week
- ☆202Updated last year
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- 「💀」Proof of concept on BYOVD attack☆158Updated 5 months ago
- ☆277Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆328Updated 9 months ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆113Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆157Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆137Updated last year
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆142Updated 11 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆190Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆180Updated last year