hosom / honeycredView external linksLinks
Utility to inject honey tokens into lsass.
☆28Feb 7, 2017Updated 9 years ago
Alternatives and similar repositories for honeycred
Users that are interested in honeycred are comparing it to the libraries listed below
Sorting:
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated last month
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- ☆24May 28, 2021Updated 4 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- ☆37Dec 27, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 3 months ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- fast-scanner can make it easy for you to develop scanners☆12Jun 8, 2020Updated 5 years ago
- Simple stacking window manager for X11☆11Aug 26, 2020Updated 5 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Different AI stuff to IRC bot☆12Oct 10, 2025Updated 4 months ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- View pe coff files with browsers.☆17May 14, 2020Updated 5 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago