Bitpixie exploitation PoC
☆96Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for bitpixie
Users that are interested in bitpixie are comparing it to the libraries listed below
Sorting:
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆76Sep 8, 2025Updated 5 months ago
- ☆37Jan 7, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated last week
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- ☆19Dec 5, 2024Updated last year
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- ☆41Mar 12, 2025Updated 11 months ago
- Bloodhound python Ingestor using ADWS☆31Feb 4, 2026Updated 3 weeks ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆132Nov 10, 2023Updated 2 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- ☆155Dec 14, 2023Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆76Nov 11, 2024Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- ☆24Feb 1, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Lateral movement with DCOM DLL hijacking☆177Jul 4, 2025Updated 7 months ago
- ☆117Jun 17, 2025Updated 8 months ago
- ASUSTeK AsIO3 I/O driver unlock☆23Apr 22, 2021Updated 4 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆191Feb 5, 2023Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆381Jan 23, 2025Updated last year
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago