scrt / tpm_sniffing_pin
☆14Updated 5 months ago
Alternatives and similar repositories for tpm_sniffing_pin:
Users that are interested in tpm_sniffing_pin are comparing it to the libraries listed below
- ☆23Updated 11 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- A lexer and parser for Sleep☆18Updated 3 months ago
- ☆24Updated 2 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 5 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- ☆20Updated this week
- ☆30Updated 4 months ago
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Cobalt Strike notifications via NTFY.☆13Updated 6 months ago
- example using NtCreateUserProcess in rust☆19Updated 3 months ago
- macOS dylib stager☆32Updated 2 months ago
- BOF for C2 framework☆41Updated 5 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆38Updated 5 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- ☆25Updated 2 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆17Updated 10 months ago
- Dumping LSA secrets: a story about task decorrelation☆14Updated 9 months ago
- Simple reverse ICMP shell☆13Updated 11 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- use python on windows with full submodule support without installation☆27Updated 2 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ELF Beacon Object File (BOF) Template☆18Updated 5 months ago
- ☆41Updated 3 weeks ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago