riskydissonance / SharpCookieMonsterLinks
Extracts cookies from Chrome.
☆204Updated 2 years ago
Alternatives and similar repositories for SharpCookieMonster
Users that are interested in SharpCookieMonster are comparing it to the libraries listed below
Sorting:
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆203Updated 3 years ago
- Windows Defender ShellCode Execution Bypass☆130Updated 5 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago
- PoC for UUID shellcode execution using DInvoke☆155Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆248Updated 4 years ago
- Windows NTLM Authentication Backdoor☆240Updated 6 months ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Updated 4 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆176Updated 5 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- I created the python script to bypass UAC to get system shell .☆122Updated 5 years ago
- Use to build an anonymous SMB file server.☆231Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆157Updated 3 years ago
- A C# implementation of RDPThief to steal credentials from RDP.☆163Updated 4 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆109Updated 2 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆124Updated last year
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Updated 5 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 3 years ago
- CVE-2021-3560 Local PrivEsc Exploit☆79Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆34Updated 4 years ago
- A sort of simple shell which support multiple protocols.☆100Updated 5 years ago