mez-0 / offensive-groovyLinks
Groovy Post Exploitation
☆20Updated 8 months ago
Alternatives and similar repositories for offensive-groovy
Users that are interested in offensive-groovy are comparing it to the libraries listed below
Sorting:
- CVE-2024-40711-exp☆42Updated 9 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- BypassCredGuard CS BOF☆42Updated 5 months ago
- ☆71Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆20Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆41Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆52Updated 4 months ago
- SAM Dumping in C#☆49Updated 6 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆38Updated this week
- Modified versions of the Cobalt Strike Process Injection Kit☆98Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Library of BOFs to interact with SQL servers☆22Updated 3 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆47Updated 4 months ago
- Parses Cobalt Strike malleable C2 profiles.☆58Updated last month
- C# Port of LdapRelayScan☆85Updated 3 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- ☆88Updated 2 years ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 9 months ago
- Sliver agent rewritten in C++☆45Updated 10 months ago
- Beacon Object File (BOF) Template☆51Updated 8 months ago
- Active Directory certificate abuse☆39Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 9 months ago
- ☆81Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆56Updated 2 years ago
- ☆44Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 6 months ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago