hoodoer / DragonHashLinks
Demo code JavaScript POC that tricks user into sending Windows hash to responder
☆17Updated last week
Alternatives and similar repositories for DragonHash
Users that are interested in DragonHash are comparing it to the libraries listed below
Sorting:
- ☆38Updated 4 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- A python script that automates a C2 Profile build☆42Updated 2 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆13Updated 4 months ago
- ☆45Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆25Updated 4 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated 2 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆24Updated 5 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆28Updated last week
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆55Updated 4 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆47Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆52Updated 2 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆29Updated 2 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Enumerate the Domain for Readable and Writable Shares☆20Updated 4 months ago
- Enumerate Domain Users Without Authentication☆36Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- Sniffing files generator☆58Updated 3 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆49Updated 3 weeks ago
- ☆50Updated 7 months ago
- ☆24Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆50Updated 3 weeks ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago