mobdk / CopyCat
Simple rapper for Mimikatz, bypass Defender
☆140Updated 3 years ago
Alternatives and similar repositories for CopyCat:
Users that are interested in CopyCat are comparing it to the libraries listed below
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- Koppeling x Metatwin x LazySign☆206Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆299Updated last year
- ☆244Updated last year
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- ☆166Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- C# version of Powermad☆158Updated last year
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆185Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- UI for creating LNKs☆96Updated 3 years ago
- Remove API hooks from a Beacon process.☆267Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆238Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆189Updated 2 years ago
- Source for tasks I have used with Covenant☆120Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆267Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆175Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- DLL Hijack Search Order Enumeration BOF☆145Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆120Updated 3 years ago
- ☆69Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago