ricardojba / Invoke-noPacLinks
.Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac
☆62Updated 2 years ago
Alternatives and similar repositories for Invoke-noPac
Users that are interested in Invoke-noPac are comparing it to the libraries listed below
Sorting:
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 4 years ago
- AutoStart teamserver and listeners with services☆74Updated 3 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆145Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 10 months ago
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆48Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆114Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆63Updated 4 years ago
- MacOS C2 Framework☆84Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- ☆57Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25Updated 3 years ago
- ☆71Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A little scanner to check the LDAP Signing state☆46Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆19Updated 4 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110Updated 5 years ago
- Modified version of Pypykatz to print encrypted credentials☆52Updated 2 years ago