☆128Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for DroppedConnection
Users that are interested in DroppedConnection are comparing it to the libraries listed below
Sorting:
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Nov 19, 2024Updated last year
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- ☆429Apr 22, 2025Updated 10 months ago
- ☆224Oct 22, 2023Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆244Jul 14, 2021Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- ☆142May 4, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆133Dec 4, 2023Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆230Jul 30, 2020Updated 5 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆124Apr 9, 2022Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆418Apr 28, 2021Updated 4 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- ☆17Jan 9, 2025Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆227Jul 30, 2021Updated 4 years ago
- Managed assembly shellcode generation☆281Mar 19, 2021Updated 5 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆596Jul 26, 2021Updated 4 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- TCP Port Redirection Utility☆765Jan 31, 2023Updated 3 years ago
- DPAPI looting remotely and locally in Python☆542Mar 13, 2026Updated last week
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆246Feb 23, 2022Updated 4 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago