ghost-ng / slingerLinks
An impacket-lite cli tool that combines many useful impacket functions using a single session.
☆51Updated this week
Alternatives and similar repositories for slinger
Users that are interested in slinger are comparing it to the libraries listed below
Sorting:
- ☆107Updated 4 months ago
- ☆56Updated 4 months ago
- ☆46Updated 2 months ago
- A python script that automates a C2 Profile build☆42Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆90Updated 5 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆50Updated last month
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- ☆82Updated 10 months ago
- ☆137Updated last month
- AzureAD beacon object files☆120Updated 6 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆67Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Adversary Emulation Framework☆114Updated 11 months ago
- A Python POC for CRED1 over SOCKS5☆149Updated 8 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆30Updated 5 months ago
- Lateral Movement☆124Updated last year
- Sniffing files generator☆58Updated 4 months ago
- TokenCert☆98Updated 7 months ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- a port of privkit bof for havoc☆23Updated last year
- ☆113Updated 5 months ago
- ☆180Updated 2 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆93Updated last month
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 3 months ago
- ☆97Updated 9 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- Enumerate Domain Users Without Authentication☆36Updated 2 months ago
- OAuth Device Code Phishing Toolkit☆61Updated 2 months ago
- Lsass dumper evading (some) EDR detection☆25Updated 4 months ago