notdodo / LocalAdminSharpLinks
.NET executable to use when dealing with privilege escalation on Windows to gain local administrator access
☆158Updated 2 years ago
Alternatives and similar repositories for LocalAdminSharp
Users that are interested in LocalAdminSharp are comparing it to the libraries listed below
Sorting:
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆131Updated 4 years ago
- ☆165Updated 2 years ago
- Remotely enables Restricted Admin Mode☆214Updated 4 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Updated 4 years ago
- An open-source process injection enumeration tool written in C#☆173Updated 2 years ago
- Fully modular persistence framework☆256Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆74Updated 3 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆175Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆255Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆242Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- ☆122Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145Updated last year
- C# havoc implant☆101Updated 2 years ago
- PowerShell Obfuscation and Data Science☆177Updated 3 years ago
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 4 years ago
- ☆222Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago