Curated list of well-developed C# Offensive Tools
☆20Jan 30, 2020Updated 6 years ago
Alternatives and similar repositories for Sharp
Users that are interested in Sharp are comparing it to the libraries listed below
Sorting:
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆24Dec 17, 2021Updated 4 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- 在一定条件下可执行命令☆11Feb 21, 2020Updated 6 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- ☆38Feb 26, 2025Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Sep 16, 2019Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Recon Hunt Queries☆79May 16, 2021Updated 4 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 2 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago