praetorian-inc / PortBenderLinks
TCP Port Redirection Utility
☆725Updated 2 years ago
Alternatives and similar repositories for PortBender
Users that are interested in PortBender are comparing it to the libraries listed below
Sorting:
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆781Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆740Updated 10 months ago
- ☆522Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆425Updated 3 years ago
- Various Cobalt Strike BOFs☆657Updated 2 years ago
- Framework for Kerberos relaying☆923Updated 3 years ago
- A .NET Framework 4.0 Windows Agent☆488Updated this week
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆681Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,147Updated 2 months ago
- ☆459Updated 2 years ago
- ☆788Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆671Updated 5 years ago
- A tool to help query AD via the LDAP protocol☆560Updated 9 months ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆412Updated 10 months ago
- ☆1,001Updated 4 months ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆785Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆426Updated 6 months ago
- NTLM relaying for Windows made easy☆568Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆462Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆876Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- PIC lsass dumper using cloned handles☆589Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆978Updated 2 years ago
- Collection of Beacon Object Files☆594Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆416Updated 3 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆375Updated 2 years ago
- Collection of remote authentication triggers in C#☆495Updated last year
- Cobalt Strike Shellcode Generator☆657Updated 6 months ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,003Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni …☆1,257Updated last year