huntandhackett / PassiveAggressionLinks
Source code and examples for PassiveAggression
☆61Updated last year
Alternatives and similar repositories for PassiveAggression
Users that are interested in PassiveAggression are comparing it to the libraries listed below
Sorting:
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- Lifetime AMSI bypass.☆35Updated 2 months ago
- BloodHound PowerShell client☆56Updated 2 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆50Updated 7 months ago
- ☆46Updated 2 months ago
- ☆137Updated last month
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆29Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- ☆56Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago
- Lateral Movement☆124Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- Sniffing files generator☆58Updated 4 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys …☆75Updated last week
- ☆82Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Persist like a Dodder☆61Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 3 months ago
- TokenCert☆98Updated 7 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆17Updated last week
- ☆65Updated last year
- Utilizng an MCP Server to communicate with your C2☆73Updated last month