rasta-mouse / RuralBishop
D/Invoke port of UrbanBishop
☆106Updated 4 years ago
Alternatives and similar repositories for RuralBishop:
Users that are interested in RuralBishop are comparing it to the libraries listed below
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆84Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆88Updated 5 years ago
- Load C# Code straight to memory☆53Updated 4 years ago
- MSBuild Without MSBuild.exe☆155Updated 4 years ago
- ☆45Updated 3 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆98Updated 2 years ago
- ☆70Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆92Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 9 months ago
- ☆56Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆114Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Simple .NET assembly to interact with services.☆38Updated 5 years ago
- ☆69Updated 3 years ago
- ☆24Updated 3 years ago
- Port of Invoke-Excel4DCOM☆103Updated 5 years ago
- Code Exec via Excel☆86Updated 7 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆140Updated 3 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Simple APPLocker bypass summary☆40Updated 6 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments