nettitude / ElephantPointView external linksLinks
☆41Updated this week
Alternatives and similar repositories for ElephantPoint
Users that are interested in ElephantPoint are comparing it to the libraries listed below
Sorting:
- NSecSoftBYOVD POC☆55Updated this week
- A stager and implant that executes remote Web Assembly☆33Feb 4, 2026Updated last week
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆41Dec 30, 2025Updated last month
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- ☆160Jan 27, 2025Updated last year
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 7 months ago
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆59Jan 19, 2026Updated 3 weeks ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- ☆55May 31, 2025Updated 8 months ago
- ☆48Apr 15, 2022Updated 3 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆42Nov 4, 2025Updated 3 months ago
- One WSL BOF to rule them all☆151Jan 14, 2026Updated last month
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆144Aug 19, 2025Updated 5 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- ☆72Mar 31, 2022Updated 3 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 7 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- ☆36May 27, 2024Updated last year
- Dominate the domain. Relay to royalty.☆178Jan 30, 2026Updated 2 weeks ago
- Abusing SSRF to deliver an authenticated command injection payload☆30Sep 1, 2025Updated 5 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- ☆31Aug 23, 2020Updated 5 years ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆48Jul 20, 2025Updated 6 months ago
- ☆137Nov 17, 2025Updated 2 months ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- CPL remote trigger☆43Dec 28, 2025Updated last month
- The God Name Server☆36Feb 9, 2026Updated last week
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 8 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago