rkbennett / RunAsPyLinks
☆10Updated 4 months ago
Alternatives and similar repositories for RunAsPy
Users that are interested in RunAsPy are comparing it to the libraries listed below
Sorting:
- ☆98Updated last year
- ☆53Updated 2 weeks ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- TokenCert☆100Updated 10 months ago
- ☆45Updated 4 months ago
- ☆48Updated 3 months ago
- Lateral movement with DCOM DLL hijacking☆141Updated 3 months ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆11Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆102Updated 5 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆41Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆93Updated 3 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 5 months ago
- Local SYSTEM auth trigger for relaying - X☆142Updated 2 months ago
- ☆53Updated 4 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆103Updated 11 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Updated last month
- ☆83Updated last year
- AzureAD beacon object files☆127Updated 9 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- Impersonate Tokens using only NTAPI functions☆80Updated 6 months ago
- A C# port from Invoke-GhostTask☆117Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 4 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆44Updated last month
- Test AMSI Provider implementation in C#☆42Updated 9 months ago
- ☆124Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆158Updated last month
- Threadless shellcode injection tool☆67Updated last year