matro7sh / havoc-sharPersistLinks
☆14Updated 6 months ago
Alternatives and similar repositories for havoc-sharPersist
Users that are interested in havoc-sharPersist are comparing it to the libraries listed below
Sorting:
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆52Updated last month
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆37Updated 2 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆30Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- ☆56Updated 4 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 10 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆12Updated 3 weeks ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- Used to get NTLMv2 Hashes from SMB☆14Updated 8 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- ZSH integration for Impacket☆61Updated 5 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆49Updated 4 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆13Updated 4 months ago
- ☆57Updated 7 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 4 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 4 months ago
- ☆71Updated last week
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆12Updated last month
- Tool to obtain hash using MS-SNTP for user accounts☆24Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 8 months ago