jas502n / mimikat_ssp
Security Support Provider Interface
☆46Updated 5 years ago
Alternatives and similar repositories for mimikat_ssp
Users that are interested in mimikat_ssp are comparing it to the libraries listed below
Sorting:
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- ☆37Updated 7 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- just test☆65Updated 2 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- Shellcode injection POC using syscalls.☆116Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- Exchange2010 authorized RCE☆155Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- CVE-2021-26855 & CVE-2021-27065☆27Updated 4 years ago
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago
- generate CobaltStrike's cross-platform payload☆34Updated 11 months ago
- Defense Evasion & Bypass AntiVirus reference☆74Updated 4 years ago
- ☆51Updated 5 years ago
- ☆28Updated 5 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆65Updated 10 months ago
- Play Doh Windows ACL Tools☆62Updated 2 years ago
- ☆74Updated 3 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- MacOS C2 Framework☆83Updated 3 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago