Takes the original idea of NetCease and adds functionality
☆24Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for NetCeasePlusPlus
Users that are interested in NetCeasePlusPlus are comparing it to the libraries listed below
Sorting:
- ☆25Jul 7, 2022Updated 3 years ago
- Run BloodHound CE in a single-user setup with podman☆36Nov 12, 2025Updated 4 months ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- ☆13Jul 30, 2021Updated 4 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆43Mar 4, 2022Updated 4 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Encrypt C functions☆41Jun 17, 2023Updated 2 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆123Mar 25, 2022Updated 3 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- ☆125Jun 28, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago