momo1239 / buffshark-shellcode-runner
Shellcode runner to execute malicious payload and bypass AV
☆14Updated 3 years ago
Alternatives and similar repositories for buffshark-shellcode-runner:
Users that are interested in buffshark-shellcode-runner are comparing it to the libraries listed below
- Active Directory certificate abuse.☆37Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆50Updated last year
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆50Updated 4 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆23Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆39Updated last year
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆50Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 5 months ago
- juicypotato for win10 > 1803 & win server 2019☆96Updated 4 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆21Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆56Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆50Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆97Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago