A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user
☆253Mar 7, 2022Updated 4 years ago
Alternatives and similar repositories for O365-Doppelganger
Users that are interested in O365-Doppelganger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Apr 16, 2022Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- ☆206Feb 24, 2022Updated 4 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆499Jan 25, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Jul 22, 2022Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- Convert shellcode into different formats!☆356Jan 24, 2023Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆412Dec 14, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- ☆482Nov 20, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,378Mar 9, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A C# utility for interacting with SCCM☆686Mar 30, 2026Updated 2 weeks ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- An Office365 User Attack Tool☆647Mar 19, 2024Updated 2 years ago
- ☆143May 4, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆143Oct 31, 2023Updated 2 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆166Apr 22, 2022Updated 3 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago