nettitude / SharpWSUS
☆443Updated 2 years ago
Alternatives and similar repositories for SharpWSUS:
Users that are interested in SharpWSUS are comparing it to the libraries listed below
- Collection of remote authentication triggers in C#☆472Updated 8 months ago
- A User Impersonation tool - via Token or Shellcode injection☆407Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆361Updated 3 years ago
- ☆355Updated 3 years ago
- Persistence by writing/reading shellcode from Event Log☆370Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆408Updated last week
- Run Powershell without software restrictions.☆283Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆280Updated 3 years ago
- C# Lsass parser☆283Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆687Updated 4 months ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆270Updated 3 years ago
- Python implementation for PetitPotam☆189Updated 3 years ago
- A tool to help query AD via the LDAP protocol☆496Updated 3 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆333Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆327Updated 2 years ago
- ☆341Updated last year
- ☆351Updated 3 years ago
- ☆379Updated last year
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆307Updated 2 years ago
- PIC lsass dumper using cloned handles☆578Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆397Updated 11 months ago
- Partial python implementation of SharpGPOAbuse☆379Updated 10 months ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆236Updated 2 years ago
- ☆749Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆390Updated last year
- PowerShell Constrained Language Mode Bypass☆241Updated 3 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆443Updated last year
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆444Updated last year
- Amplify network visibility from multiple POV of other hosts☆300Updated 9 months ago
- AD ACL abuse☆270Updated this week