secur30nly / rust-herpaderping
Rust implementation of the Process Herpaderping
☆24Updated last year
Alternatives and similar repositories for rust-herpaderping:
Users that are interested in rust-herpaderping are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 9 months ago
- ☆25Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 8 months ago
- ☆20Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- ☆19Updated last year
- ☆47Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆20Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- ☆35Updated 10 months ago
- Some of my custom "tools".☆23Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- ☆25Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- A VSCode plugin to assist with BOF development.☆34Updated 8 months ago