mez-0 / offensive-groovyLinks
Groovy Post Exploitation
☆19Updated last year
Alternatives and similar repositories for offensive-groovy
Users that are interested in offensive-groovy are comparing it to the libraries listed below
Sorting:
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 10 months ago
- CVE-2024-40711-exp☆42Updated last year
- BypassCredGuard CS BOF☆48Updated 11 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆51Updated 5 months ago
- ☆73Updated last year
- Sliver agent rewritten in C++☆49Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Updated 3 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 9 months ago
- ☆49Updated 7 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Updated 3 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Updated 2 years ago
- ProcExp Driver (Ab)use☆22Updated 3 years ago
- Library of BOFs to interact with SQL servers☆23Updated 8 months ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆43Updated 2 years ago
- SAM Dumping in C#☆54Updated last month
- Parses Cobalt Strike malleable C2 profiles.☆59Updated last week
- ☆33Updated 9 months ago
- UDC2 implementation that provides an ICMP C2 channel☆98Updated last month
- Using LNK files and user input simulation to start processes under explorer.exe☆31Updated last year
- Beacon Object File (BOF) Template☆60Updated last year
- Bloodhound python Ingestor using ADWS☆27Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆48Updated 3 years ago
- ☆49Updated 6 months ago
- ☆84Updated 2 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆30Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Updated 3 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Updated last year
- ☆26Updated last year