ps1337 / Lastenzug
Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level
☆26Updated 2 years ago
Alternatives and similar repositories for Lastenzug:
Users that are interested in Lastenzug are comparing it to the libraries listed below
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆48Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ☆48Updated 2 years ago
- ☆16Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 2 weeks ago
- ☆38Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- All my POC related to malware development☆11Updated 11 months ago
- A care package of useful bofs for red team engagments☆55Updated 5 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated this week
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Click Once + App Domain☆62Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated last year
- ☆18Updated 4 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…