C# Port of LdapRelayScan
☆91Nov 26, 2025Updated 3 months ago
Alternatives and similar repositories for SharpLdapRelayScan
Users that are interested in SharpLdapRelayScan are comparing it to the libraries listed below
Sorting:
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- ☆235Oct 8, 2024Updated last year
- ☆94May 14, 2022Updated 3 years ago
- ☆130Dec 4, 2023Updated 2 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- Automated compiler obfuscation for nim☆139Jun 27, 2022Updated 3 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆473Jul 6, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Enumerate Domain Data☆336Sep 13, 2023Updated 2 years ago
- ☆159Apr 17, 2024Updated last year
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Mar 8, 2023Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆378Dec 26, 2022Updated 3 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆312Nov 29, 2023Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Aug 1, 2022Updated 3 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- ☆476Nov 20, 2022Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- ☆223Oct 22, 2023Updated 2 years ago