latortuga71 / SharpChisel-NG
☆35Updated last year
Alternatives and similar repositories for SharpChisel-NG:
Users that are interested in SharpChisel-NG are comparing it to the libraries listed below
- ☆47Updated last year
- Click Once + App Domain☆62Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 6 months ago
- Just another ntdll unhooking using Parun's Fart technique☆73Updated 2 years ago
- Bunch of BOF files☆27Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ☆28Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 9 months ago
- A care package of useful bofs for red team engagments☆54Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆63Updated last month
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated last month
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- ☆58Updated last year
- ☆56Updated 3 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆56Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆74Updated last month