rkbennett / RunAsPyLinks
☆11Updated 6 months ago
Alternatives and similar repositories for RunAsPy
Users that are interested in RunAsPy are comparing it to the libraries listed below
Sorting:
- ☆99Updated last year
- a BOF implementation of various registry persistence methods☆92Updated last month
- ☆49Updated 6 months ago
- TokenCert☆102Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- ☆52Updated 2 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆117Updated last week
- Tool to bypass LSA Protection (aka Protected Process Light)☆62Updated 11 months ago
- Local SYSTEM auth trigger for relaying - X☆154Updated 4 months ago
- ☆50Updated 5 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆105Updated 7 months ago
- ☆89Updated last week
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Lateral movement with DCOM DLL hijacking☆174Updated 5 months ago
- Threadless shellcode injection tool☆67Updated last year
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆83Updated last month
- A C# port from Invoke-GhostTask☆118Updated last year
- ☆54Updated 6 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Python script to leverage MSFT_MTProcess WMI class☆39Updated 3 months ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- BOF to decrypt Signal Desktop chat logs☆72Updated 9 months ago
- sideloading PoC using onedrive.exe & version.dll☆85Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- ☆135Updated last month
- ☆121Updated 10 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated 3 months ago