retr0-13 / proxy_AttackchainLinks
☆47Updated 3 years ago
Alternatives and similar repositories for proxy_Attackchain
Users that are interested in proxy_Attackchain are comparing it to the libraries listed below
Sorting:
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Updated 2 years ago
- This is learning to write windows 32 api instance code in the golang language☆42Updated 4 years ago
- ☆102Updated 3 years ago
- PortBender修改为exe版本☆29Updated 2 years ago
- ☆94Updated 3 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆58Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated 2 years ago
- CVE-2020-1472 C++☆84Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- ☆46Updated 4 years ago
- resource-based constrained delegation RBCD☆46Updated 4 years ago
- CobaltStrike and Google Auth twice☆63Updated 4 years ago
- dump lsass☆37Updated 3 years ago
- 一个基于DNS隧道的简单C2☆61Updated 3 years ago
- 密码收集☆58Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- kill windows log☆45Updated last year
- 轻便的恶意反代☆48Updated 4 years ago
- ☆15Updated 2 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- Cobalt Strike BOF that Add an admin user☆78Updated 3 years ago
- Lsass memory dump.☆54Updated 2 years ago
- NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script☆88Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- Exchange ProxyRelay POC☆37Updated 3 years ago
- If you only have hash, you can still operate exchange☆78Updated 4 years ago
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆142Updated 3 years ago