mobdk / CoreClassLinks
Mimikatz embedded as classes
☆28Updated 4 years ago
Alternatives and similar repositories for CoreClass
Users that are interested in CoreClass are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆27Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- ☆12Updated 5 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Updated 2 years ago
- ☆61Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 6 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 9 months ago
- ☆40Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆42Updated 4 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago