skelsec / aiosmbLinks
Fully asynchronous SMB library written in pure python
☆214Updated last week
Alternatives and similar repositories for aiosmb
Users that are interested in aiosmb are comparing it to the libraries listed below
Sorting:
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆247Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Updated 4 years ago
- Kerberos manipulation library in pure Python☆292Updated 2 weeks ago
- ☆402Updated 4 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆196Updated 4 years ago
- Bring your own print driver privilege escalation tool☆260Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆421Updated 3 years ago
- ☆193Updated 3 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆264Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆181Updated 2 years ago
- Load any Beacon Object File using Powershell!☆258Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆342Updated 4 years ago
- ☆156Updated 9 months ago
- ☆209Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- ☆86Updated 2 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆211Updated last year
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆199Updated 5 years ago
- Recovering NTLM hashes from Credential Guard☆349Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆199Updated 3 months ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆245Updated 5 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆231Updated 4 years ago
- Simple EDR implementation to demonstrate bypass☆181Updated 5 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago
- ☆262Updated 2 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 3 years ago