sliverarmory / armory
The Official Sliver Armory
☆95Updated last month
Alternatives and similar repositories for armory:
Users that are interested in armory are comparing it to the libraries listed below
- PoC to coerce authentication from Windows hosts using MS-WSP☆229Updated last year
- Attempt at Obfuscated version of SharpCollection☆203Updated last week
- ☆159Updated 6 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆70Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- My implementation of the GIUDA project in C++☆167Updated last year
- Execute shellcode files with rundll32☆190Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆278Updated 3 months ago
- ☆219Updated last year
- ☆220Updated 9 months ago
- Multiplayer pivoting solution☆132Updated this week
- ☆99Updated last year
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- Shaco is a linux agent for havoc☆156Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆283Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆104Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆208Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- ☆192Updated 10 months ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- Havoc C2 profile generator☆70Updated 3 months ago
- COM Hijacking VOODOO☆261Updated this week
- A collection of code snippets built to assist with breaking chains.☆116Updated 9 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆390Updated 8 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆173Updated 11 months ago
- (Demo) 3rd party agent for Havoc☆133Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago