slyd0g / WhiteChocolateMacademiaNutLinks
Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies
☆179Updated 2 years ago
Alternatives and similar repositories for WhiteChocolateMacademiaNut
Users that are interested in WhiteChocolateMacademiaNut are comparing it to the libraries listed below
Sorting:
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆228Updated 4 years ago
- ☆94Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆187Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- ☆155Updated 6 months ago
- LDAP Querying without the Suck☆110Updated 9 months ago
- Quick and dirty dynamic redirect.rules generator☆164Updated 2 years ago
- Exchangelib wrapper for pentesting☆65Updated 6 months ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆130Updated 3 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- ☆120Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆107Updated 3 years ago
- Koppeling x Metatwin x LazySign☆214Updated 4 years ago
- Buggy script to play with GPOs☆115Updated 8 months ago
- Run Rubeus via Rundll32☆201Updated 5 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆209Updated last year
- ☆164Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆197Updated 4 years ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆178Updated 2 years ago
- ☆72Updated 3 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago