mdsecactivebreach / CloneVault
☆68Updated 4 years ago
Alternatives and similar repositories for CloneVault:
Users that are interested in CloneVault are comparing it to the libraries listed below
- ☆52Updated 4 years ago
- Suite of Shellcode Running Utilities☆107Updated 4 years ago
- Service Enumeration C# .NET Assembly☆59Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆140Updated 3 years ago
- Credential Dumper☆74Updated 4 years ago
- MSBuild Without MSBuild.exe☆155Updated 4 years ago
- Outlook persistence using VSTO add-ins☆84Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆57Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆98Updated 2 years ago
- ☆92Updated 2 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆88Updated 4 years ago
- Port of Invoke-Excel4DCOM☆102Updated 5 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆63Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Updated 3 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆90Updated 4 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆87Updated 3 months ago
- Smart overlay for Cobalt Strike PS function☆30Updated 5 years ago
- A little tool to play with Kerberos.☆66Updated last year
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆83Updated 4 years ago
- A tool to password spray Jenkins instances☆54Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago