mez-0 / citadelLinks
A Payload Analysis Framework
☆110Updated last month
Alternatives and similar repositories for citadel
Users that are interested in citadel are comparing it to the libraries listed below
Sorting:
- Internal Monologue BOF☆79Updated 10 months ago
- Impersonate Tokens using only NTAPI functions☆82Updated 7 months ago
- ☆108Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆132Updated 4 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 10 months ago
- macOS dylib stager☆36Updated 9 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆117Updated 3 weeks ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆91Updated 4 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 5 months ago
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 4 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- A small How-To on creating your own weaponized WSL file☆117Updated 3 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 9 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Updated last year
- A hoontr must hoont☆101Updated 3 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆43Updated 4 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆129Updated 3 weeks ago
- RPC to WebClient startup☆52Updated 3 months ago
- A Mythic Agent written in PIC C.☆202Updated 9 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆115Updated last week
- ☆31Updated 3 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 6 months ago
- Easy peasy file uploads☆27Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆136Updated 9 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 9 months ago
- Execute shellcode via ASPNET compiler☆58Updated last month
- Sniffing files generator☆59Updated 8 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆132Updated 2 months ago