pkb1s / SharpRelay
☆175Updated 4 years ago
Alternatives and similar repositories for SharpRelay:
Users that are interested in SharpRelay are comparing it to the libraries listed below
- Pass the Hash to a named pipe for token Impersonation☆143Updated 3 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆219Updated 5 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆102Updated 4 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆198Updated 4 years ago
- C# version of Powermad☆164Updated last year
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 4 years ago
- My CobaltStrike BOFS☆164Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆123Updated 2 years ago
- Cobalt Strike Beacon Object Files☆161Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆171Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆138Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆141Updated 4 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆117Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- Perform DCSync operation without mimikatz☆143Updated 5 months ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆202Updated 3 years ago
- ☆157Updated 2 years ago
- Collection of CobaltStrike beacon object files☆103Updated 3 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆174Updated 2 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- ☆93Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆159Updated last year
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆188Updated 4 years ago
- ☆141Updated 2 years ago
- PoC to interact with local/remote registry hives through WMI☆85Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆216Updated last year
- CSHARP DCOM Fun☆128Updated 5 years ago