mallo-m / AxiomSecretsLinks
Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition
☆26Updated last week
Alternatives and similar repositories for AxiomSecrets
Users that are interested in AxiomSecrets are comparing it to the libraries listed below
Sorting:
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆172Updated this week
- A Payload Analysis Framework☆110Updated last month
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆117Updated last month
- ☆31Updated 3 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 3 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆126Updated 3 months ago
- ☆108Updated last year
- Living Off the Foreign Land setup scripts☆72Updated 8 months ago
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 6 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 6 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 11 months ago
- Dump Kerberos tickets☆42Updated 3 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 10 months ago
- Utilities for obfuscating shellcode☆95Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆162Updated 9 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆24Updated 3 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆43Updated 5 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆91Updated 4 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆106Updated last month
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- ☆52Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆46Updated last month
- A Mythic Agent written in PIC C.☆202Updated 9 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆96Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆132Updated 4 months ago