moloch-- / sliver-pyLinks
A Python gRPC Client Library for Sliver
☆75Updated 6 months ago
Alternatives and similar repositories for sliver-py
Users that are interested in sliver-py are comparing it to the libraries listed below
Sorting:
- The Official Sliver Armory☆117Updated 6 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆106Updated 3 years ago
- ☆170Updated last year
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆125Updated 3 years ago
- Rusty Impersonate☆100Updated 2 years ago
- Kerberos protocol attacker☆138Updated 4 years ago
- (Demo) 3rd party agent for Havoc☆145Updated 2 years ago
- ☆222Updated last year
- Buggy script to play with GPOs☆116Updated 9 months ago
- Your syscall factory☆125Updated 3 weeks ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆101Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆226Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆181Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Find .net assemblies locally☆126Updated 3 years ago
- ☆209Updated 5 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆120Updated last year
- ADCS cert template modification and ACL enumeration☆143Updated 2 years ago
- ☆129Updated 2 years ago
- ☆195Updated last year
- ☆119Updated 6 months ago
- My implementation of the GIUDA project in C++☆187Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- ☆213Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆174Updated 2 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆124Updated 2 years ago