praetorian-inc / PortBenderLinks
TCP Port Redirection Utility
☆751Updated 2 years ago
Alternatives and similar repositories for PortBender
Users that are interested in PortBender are comparing it to the libraries listed below
Sorting:
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆765Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆827Updated 2 years ago
- ☆536Updated 4 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆433Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆721Updated 2 years ago
- Framework for Kerberos relaying☆933Updated 3 years ago
- ☆1,084Updated 3 weeks ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆811Updated 2 years ago
- ☆814Updated 3 years ago
- PIC lsass dumper using cloned handles☆595Updated 3 years ago
- ☆474Updated 3 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆470Updated 2 years ago
- Various Cobalt Strike BOFs☆713Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,181Updated 8 months ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆429Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆438Updated 11 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆988Updated 3 years ago
- Collection of remote authentication triggers in C#☆520Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆929Updated 3 years ago
- Cobalt Strike Shellcode Generator☆667Updated 11 months ago
- Cobalt Strike kit for Lateral Movement☆675Updated 5 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆811Updated 2 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,010Updated 4 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,029Updated 2 weeks ago
- Self-developed tools for Lateral Movement/Code Execution☆715Updated 4 years ago
- NTLM relaying for Windows made easy☆578Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆746Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆421Updated 3 years ago
- A .NET Framework 4.0 Windows Agent☆521Updated last week
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆587Updated 4 months ago