jfjallid / go-cmlootView external linksLinks
A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)
☆16Jul 27, 2024Updated last year
Alternatives and similar repositories for go-cmloot
Users that are interested in go-cmloot are comparing it to the libraries listed below
Sorting:
- ☆79Sep 8, 2025Updated 5 months ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 8, 2026Updated last week
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- ☆20Sep 6, 2025Updated 5 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆10Jun 26, 2024Updated last year
- The command prompt has been disabled by your administrator☆43May 18, 2023Updated 2 years ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆160Jan 23, 2026Updated 3 weeks ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- ☆21Jan 8, 2026Updated last month
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 10 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 2 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Dec 16, 2023Updated 2 years ago
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A tool to abuse Exchange services☆12Mar 18, 2024Updated last year
- ☆12Jan 7, 2025Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Jun 29, 2024Updated last year
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Nov 24, 2024Updated last year
- ☆131Dec 4, 2023Updated 2 years ago
- ☆37Jan 7, 2025Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 7 months ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls…☆15Jun 2, 2024Updated last year
- ☆116Jun 17, 2025Updated 7 months ago