skelsec / aardwolfLinks
Asynchronous RDP client for Python (headless)
☆217Updated 5 months ago
Alternatives and similar repositories for aardwolf
Users that are interested in aardwolf are comparing it to the libraries listed below
Sorting:
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138Updated 3 years ago
- ☆225Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆259Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆374Updated 3 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆325Updated 3 years ago
- Extracting NetNTLM without touching lsass.exe☆242Updated 2 years ago
- My implementation of the GIUDA project in C++☆189Updated 2 years ago
- ACL abuse swiss-knife☆127Updated 3 years ago
- ☆247Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- The Official Sliver Armory☆129Updated 9 months ago
- A Python gRPC Client Library for Sliver☆79Updated 9 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆155Updated 2 years ago
- ☆184Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Updated 3 years ago
- A BOF to automate common persistence tasks for red teamers☆293Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Updated 4 years ago
- ☆120Updated 10 months ago
- ☆169Updated last year
- ☆129Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- (Demo) 3rd party agent for Havoc☆147Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆133Updated 2 years ago
- ☆216Updated 3 months ago
- Beacon Object File & C# project to check LDAP signing☆199Updated last year
- Buggy script to play with GPOs☆122Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Updated 3 years ago