leitosama / SharpZeroLogonLinks
Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3.5
☆28Updated 4 years ago
Alternatives and similar repositories for SharpZeroLogon
Users that are interested in SharpZeroLogon are comparing it to the libraries listed below
Sorting:
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated last month
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- dump lsass tool☆38Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- Cs-Sleep-Mask-Fiber☆18Updated 4 months ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆150Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- use aswArPot.sys to kill process☆68Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 6 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆79Updated 2 years ago
- A simple hidden vnc.☆34Updated 4 years ago
- ☆46Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆46Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- golang amsi bypass☆30Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆77Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆140Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- More EFS coerced authentication method with PetitPotam.py☆26Updated 2 years ago