mandiant / route-sixty-sinkView external linksLinks
Link sources to sinks in C# applications.
☆150Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for route-sixty-sink
Users that are interested in route-sixty-sink are comparing it to the libraries listed below
Sorting:
- ☆226Dec 18, 2025Updated last month
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- Java RMI Vulnerability Scanner☆914Jul 3, 2024Updated last year
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Finding Java gadget chains with CodeQL☆184Jan 14, 2025Updated last year
- Exploring RPC interfaces on Windows☆341Jan 30, 2024Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆524Jun 10, 2025Updated 8 months ago
- ☆78Oct 18, 2022Updated 3 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- JMX enumeration and attacking tool.☆494Jun 26, 2025Updated 7 months ago
- ☆17May 29, 2018Updated 7 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,050Jan 22, 2026Updated 3 weeks ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆643Feb 15, 2025Updated last year
- ☆214Dec 2, 2025Updated 2 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 6 months ago
- GreHack 2021 CodeQL for Java workshop☆75Nov 19, 2021Updated 4 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆146Jan 16, 2023Updated 3 years ago
- Roast in the Middle☆295Sep 19, 2025Updated 4 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆259May 10, 2023Updated 2 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆347Sep 1, 2021Updated 4 years ago
- Exchange ProxyRelay POC☆37Oct 20, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago