This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.
☆42Apr 6, 2026Updated 2 weeks ago
Alternatives and similar repositories for PAMSkeletonKey
Users that are interested in PAMSkeletonKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 5 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 10 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 2 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- ☆26Apr 10, 2026Updated last week
- ☆12Jun 12, 2021Updated 4 years ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆74Mar 15, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- Companion content for my 'Fun with Office Macros' webcast.☆25Apr 18, 2024Updated 2 years ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Leiningen plugin responsible for finding possible vulnerabilities in clojure applications.☆11Sep 25, 2021Updated 4 years ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated last week
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2020–9934 POC☆24Jul 28, 2020Updated 5 years ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 4 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆106Jan 9, 2026Updated 3 months ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆255Mar 26, 2026Updated 3 weeks ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- ☆50Jun 4, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Execute shellcode via ASPNET compiler☆60Oct 2, 2025Updated 6 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆287Apr 8, 2026Updated last week
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆68Mar 26, 2026Updated 3 weeks ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- Blue Hammer by Nightmare-Eclipse Vulnerability Documentation & Reimplementation.☆106Apr 8, 2026Updated last week