moloch-- / sliver-pyLinks
A Python gRPC Client Library for Sliver
☆78Updated 8 months ago
Alternatives and similar repositories for sliver-py
Users that are interested in sliver-py are comparing it to the libraries listed below
Sorting:
- The Official Sliver Armory☆124Updated 8 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆136Updated 3 years ago
- ☆169Updated last year
- Your syscall factory☆126Updated this week
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆233Updated 3 years ago
- ☆223Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- (Demo) 3rd party agent for Havoc☆146Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- ☆215Updated 2 months ago
- Rusty Impersonate☆102Updated 2 months ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 4 years ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆258Updated 8 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Kerberos protocol attacker☆140Updated 4 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- Buggy script to play with GPOs☆120Updated last year
- Recovering NTLM hashes from Credential Guard☆353Updated 3 years ago
- ☆88Updated 2 years ago
- ☆247Updated 3 years ago
- ☆215Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆40Updated 3 weeks ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago