h4wkst3r / SharPersist
Windows Persistence Toolkit in C#
☆34Updated last year
Related projects: ⓘ
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆85Updated 7 months ago
- Click Once + App Domain☆61Updated 9 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆49Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- ☆65Updated this week
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆19Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- C# version of NTLMRawUnHide☆71Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated 8 months ago
- A care package of useful bofs for red team engagments☆47Updated last year
- Python module for running BOFs☆63Updated last year
- Lockless BOF☆62Updated 7 months ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆81Updated 2 years ago
- ☆24Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆82Updated last year
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- ☆54Updated last month
- Aggressor script add-in for CobaltStrike to track file uploads☆34Updated last year
- ☆61Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆114Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆36Updated last year
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆25Updated 3 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆80Updated 3 months ago
- .NET project for installing Persistence☆64Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆87Updated last year