phishingclub / session-sushiView external linksLinks
Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.
☆22Dec 31, 2025Updated last month
Alternatives and similar repositories for session-sushi
Users that are interested in session-sushi are comparing it to the libraries listed below
Sorting:
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆89Updated this week
- Commandline spoofing on Windows☆93Nov 25, 2025Updated 2 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 6 months ago
- ☆38Oct 16, 2025Updated 4 months ago
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 9 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 9 months ago
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- ☆24Dec 21, 2025Updated last month
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 9 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 7 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆92Jan 27, 2026Updated 3 weeks ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆82Feb 10, 2026Updated last week
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆55Jan 17, 2026Updated 3 weeks ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆114Oct 30, 2025Updated 3 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 5 months ago
- Situational Awareness script to identify how and where to run implants☆67Dec 6, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year