mez-0 / offensive-groovy
Groovy Post Exploitation
☆20Updated 5 months ago
Alternatives and similar repositories for offensive-groovy:
Users that are interested in offensive-groovy are comparing it to the libraries listed below
- ☆68Updated last year
- CVE-2024-40711-exp☆39Updated 5 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated 10 months ago
- SAM Dumping in C#☆44Updated 2 months ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆47Updated 3 months ago
- BypassCredGuard CS BOF☆33Updated 2 months ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆25Updated 4 months ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- ☆79Updated last year
- Library of BOFs to interact with SQL servers☆158Updated 3 months ago
- Sliver agent rewritten in C++☆44Updated 6 months ago
- ☆83Updated last year
- ELF Beacon Object File (BOF) Template☆48Updated 4 months ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Updated 6 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated last month
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated 2 years ago
- Lsass dumper evading (some) EDR detection☆22Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆51Updated last week
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆41Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 6 months ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 11 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆42Updated 11 months ago