securesean / DecryptAutoLogonLinks
Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon
☆220Updated 4 years ago
Alternatives and similar repositories for DecryptAutoLogon
Users that are interested in DecryptAutoLogon are comparing it to the libraries listed below
Sorting:
- .NET Project for performing Authenticated Remote Execution☆397Updated 2 years ago
- Miscellaneous Tools☆267Updated 4 years ago
- .NET Project for Attacking vCenter☆542Updated 3 years ago
- ☆293Updated 11 months ago
- ☆358Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆195Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆304Updated 4 years ago
- Cobalt Strike kit for Persistence☆475Updated 5 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆202Updated 4 years ago
- ☆347Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆363Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆307Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆460Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆478Updated 3 years ago
- C# Lsass parser☆292Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆224Updated 3 years ago
- ☆521Updated 3 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆173Updated 5 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆367Updated 3 years ago
- .NET project for installing Persistence☆477Updated 11 months ago
- Create a minidump of the LSASS process from memory☆260Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆328Updated 2 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆151Updated 4 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆200Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆338Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆215Updated 2 years ago