gokupwn / shootCutMe
ShootCutMe an .LNK file creator tool for redteamer
☆13Updated 5 months ago
Alternatives and similar repositories for shootCutMe:
Users that are interested in shootCutMe are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆16Updated 11 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 8 months ago
- ☆21Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆26Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆37Updated 7 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆18Updated 5 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 2 years ago
- All my POC related to malware development☆11Updated 10 months ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated this week
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆16Updated 5 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- ☆17Updated 3 months ago