milosilo / DLL-Proxy-Hijacking-Microsoft-TeamsLinks
Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example
☆16Updated 4 years ago
Alternatives and similar repositories for DLL-Proxy-Hijacking-Microsoft-Teams
Users that are interested in DLL-Proxy-Hijacking-Microsoft-Teams are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆65Updated last year
- Find Inbound Email Domains☆35Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 8 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 9 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆59Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Updated 3 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- ☆44Updated last year
- ☆52Updated last year
- ☆18Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆48Updated 10 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- Your Skyfall Infrastructure Pack☆89Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 9 months ago
- ☆29Updated 2 years ago
- ☆42Updated 6 months ago
- Remote Template Injection Toolkit☆45Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆48Updated 2 months ago
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- Automatically deploy Nemesis☆21Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Linux CS bypass technique☆32Updated 10 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 9 months ago