C# Port of LdapRelayScan
☆92Nov 26, 2025Updated 5 months ago
Alternatives and similar repositories for SharpLdapRelayScan
Users that are interested in SharpLdapRelayScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beacon Object File & C# project to check LDAP signing☆202Aug 7, 2024Updated last year
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆419Jan 27, 2024Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- ☆181Feb 3, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Coerce Windows machines auth via MS-EVEN☆174Jan 17, 2024Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆136Dec 4, 2023Updated 2 years ago
- Framework for Kerberos relaying☆946May 29, 2022Updated 3 years ago
- ☆235Oct 8, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- Automated compiler obfuscation for nim☆137Jun 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆476Jul 6, 2024Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆46Jun 25, 2024Updated last year
- ☆489Nov 20, 2022Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Apr 4, 2026Updated 3 weeks ago
- ☆163Apr 17, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- .NET 4.0 WinRM API Command Execution☆165Sep 11, 2020Updated 5 years ago
- In-memory token vault BOF for Cobalt Strike☆150Aug 18, 2022Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Sep 3, 2023Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Apr 12, 2020Updated 6 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆224Oct 22, 2023Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆220Jul 14, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,073Mar 20, 2026Updated last month