gh0x0st / wandererLinks
An open-source process injection enumeration tool written in C#
☆173Updated 2 years ago
Alternatives and similar repositories for wanderer
Users that are interested in wanderer are comparing it to the libraries listed below
Sorting:
- ☆165Updated 2 years ago
- Collection of random RedTeam scripts.☆207Updated last year
- ☆222Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- ☆119Updated 6 months ago
- ☆122Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆152Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆103Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- Automated exploitation of MSSQL servers at scale☆118Updated 3 weeks ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆74Updated 3 years ago
- ACL abuse swiss-knife☆123Updated 2 years ago
- PowerShell Obfuscation and Data Science☆177Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆141Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆116Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Updated 2 years ago
- ☆71Updated 6 months ago
- AV Evasion Techniques☆79Updated 3 years ago
- Evasive Golang Loader☆136Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 3 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆174Updated last month
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated last year
- ☆120Updated last year