mvelazc0 / SharpShareFinder
SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveraging .NET parallelism.
☆26Updated 7 months ago
Alternatives and similar repositories for SharpShareFinder:
Users that are interested in SharpShareFinder are comparing it to the libraries listed below
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆45Updated last year
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- Active Directory certificate abuse☆33Updated 2 years ago
- ☆36Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- ☆52Updated last year
- ☆41Updated 7 months ago
- ☆25Updated last year
- Microsoft Graph API post-exploitation toolkit☆93Updated 7 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 5 months ago
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- ☆48Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆73Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago