matro7sh / havoc-sharPersist
☆9Updated last month
Alternatives and similar repositories for havoc-sharPersist:
Users that are interested in havoc-sharPersist are comparing it to the libraries listed below
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆37Updated 6 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 3 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 7 months ago
- ☆48Updated 3 months ago
- A simple website to act as a store for havoc modules and extensions☆25Updated last week
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 8 months ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- BOF for C2 framework☆39Updated 2 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 11 months ago
- SAM Dumping in C#☆40Updated 2 weeks ago
- Sniffing files generator☆50Updated 2 months ago
- ☆16Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆113Updated 3 months ago
- ☆54Updated 2 months ago
- Pre-Auth Exploit for CVE-2024-40711☆38Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆27Updated 5 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- ZSH integration for Impacket☆59Updated last week
- ☆47Updated last year
- ☆46Updated last year
- Unix Process hollowing in rust☆20Updated last month
- in-process powershell runner for BRC4☆45Updated last year