jfmaes / LazySign
Create fake certs for binaries using windows binaries and the power of bat files
☆562Updated last year
Alternatives and similar repositories for LazySign
Users that are interested in LazySign are comparing it to the libraries listed below
Sorting:
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆743Updated last year
- some gadgets about windows process and ready to use :)☆586Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆842Updated 2 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆862Updated 4 years ago
- NTLM relaying for Windows made easy☆563Updated 2 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆523Updated 2 years ago
- Red Team C code repo☆551Updated 5 months ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,001Updated 3 years ago
- A tool for generating fake code signing certificates or signing real ones☆919Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,142Updated 4 years ago
- Get file less command execution for lateral movement.☆617Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,392Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆796Updated 2 years ago
- Dump the memory of a PPL with a userland exploit☆871Updated 2 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆419Updated 4 years ago
- Encrypted PE Loader Generator☆542Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,319Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆799Updated 4 years ago
- C# Script used for Red Team☆720Updated 3 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆464Updated 3 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,020Updated 2 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆683Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,204Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,531Updated 4 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆917Updated 11 months ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆954Updated 5 months ago
- A .NET Framework 4.0 Windows Agent☆474Updated this week
- C# tool for UAC bypasses☆430Updated 3 years ago
- Various Cobalt Strike BOFs☆638Updated 2 years ago