r4wd3r / RID-Hijacking
Windows RID Hijacking persistence technique
☆169Updated 2 months ago
Alternatives and similar repositories for RID-Hijacking:
Users that are interested in RID-Hijacking are comparing it to the libraries listed below
- Quick Malicious ClickOnceGenerator for Red Team☆246Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆255Updated 6 years ago
- ☆78Updated 8 years ago
- Obfuscated Penetration Testing PowerShell scripts☆139Updated 2 months ago
- Some .ps1 scripts for pentesting☆131Updated 4 years ago
- Assorted scripts and one off things☆262Updated 5 months ago
- Lateral Movement technique using DCOM and HTA☆230Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆174Updated last year
- DLL Generator for side loading attack☆169Updated 5 years ago
- How To Execute Shellcode via HTA☆137Updated 6 years ago
- ☆229Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆163Updated 7 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆322Updated 5 years ago
- ☆164Updated 9 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆150Updated 6 years ago
- ☆256Updated 2 years ago
- Domain user enumeration tool☆213Updated last year
- An Insider Threat Toolkit☆149Updated 6 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆253Updated 6 years ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆375Updated 5 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆143Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆246Updated 4 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆123Updated 5 years ago