Redirecting (specific) TCP, UDP and ICMP traffic to another destination.
☆426Mar 5, 2021Updated 5 years ago
Alternatives and similar repositories for StreamDivert
Users that are interested in StreamDivert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TCP Port Redirection Utility☆767Jan 31, 2023Updated 3 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- A TCP packet diverter for Windows platform☆339Jun 29, 2016Updated 9 years ago
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- The swiss army knife of LSASS dumping☆2,083Sep 17, 2024Updated last year
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆807Jul 6, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,264Aug 27, 2023Updated 2 years ago
- Dump the memory of a PPL with a userland exploit☆887Jul 24, 2022Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- A way to delete a locked file, or current running executable, on disk.☆618Nov 5, 2025Updated 4 months ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- Remote operations commands implemented using Beacon Object Files☆1,144Mar 5, 2026Updated 2 weeks ago
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆238Dec 7, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆935Nov 11, 2024Updated last year
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,403Nov 22, 2023Updated 2 years ago
- ☆479Nov 20, 2022Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆483Jul 12, 2023Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆668Nov 17, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 3 years ago