grayhatkiller / wambam-bofLinks
☆39Updated last month
Alternatives and similar repositories for wambam-bof
Users that are interested in wambam-bof are comparing it to the libraries listed below
Sorting:
- SAM Dumping in C#☆50Updated 7 months ago
- ☆35Updated 5 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- ☆53Updated 8 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 10 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆47Updated 5 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆36Updated 3 months ago
- ☆47Updated last month
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆54Updated 4 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆23Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- Click Once + App Domain☆63Updated last year
- in-process powershell runner for BRC4☆46Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆39Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆28Updated last year
- ☆82Updated last year
- ☆26Updated last year
- ☆36Updated 7 months ago
- Sniffing files generator☆59Updated 5 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆26Updated 3 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 6 months ago
- ☆53Updated 2 months ago
- ☆110Updated 6 months ago
- ☆97Updated 11 months ago
- ☆29Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated last month