Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
☆191Mar 4, 2021Updated 5 years ago
Alternatives and similar repositories for rpc2socks
Users that are interested in rpc2socks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆181Feb 3, 2021Updated 5 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,245Nov 2, 2022Updated 3 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- TCP Port Redirection Utility☆767Jan 31, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- A tool to make socks connections through HTTP agents☆719Mar 30, 2021Updated 4 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- C# version of Powermad☆169Dec 5, 2023Updated 2 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,357Jul 12, 2024Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆220Jul 14, 2021Updated 4 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Dumping DPAPI credz remotely☆1,348Mar 24, 2025Updated last year
- Collection of Beacon Object Files☆635Nov 1, 2022Updated 3 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- Dump the memory of a PPL with a userland exploit☆887Jul 24, 2022Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆376Sep 20, 2025Updated 6 months ago
- ☆164Dec 30, 2022Updated 3 years ago
- Lockless allows for the copying of locked files.☆254Apr 30, 2021Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆374Oct 30, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- More examples using the Impacket library designed for learning purposes.☆264Nov 4, 2022Updated 3 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆932Jul 26, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago