matro7sh / havoc-sharPersistLinks
☆14Updated 10 months ago
Alternatives and similar repositories for havoc-sharPersist
Users that are interested in havoc-sharPersist are comparing it to the libraries listed below
Sorting:
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- ZSH integration for Impacket☆72Updated 8 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 2 weeks ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆53Updated last week
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆53Updated 7 months ago
- ☆92Updated 9 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated 10 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 6 months ago
- ☆57Updated 8 months ago
- ☆82Updated 5 months ago
- Most Responder's configuration power in your hand.☆51Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆42Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- Phishing Framework for OTP codes☆39Updated last week
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆13Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆31Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.