slyd0g / WhiteChocolateMacademiaNutLinks
Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies
☆189Updated 2 years ago
Alternatives and similar repositories for WhiteChocolateMacademiaNut
Users that are interested in WhiteChocolateMacademiaNut are comparing it to the libraries listed below
Sorting:
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆232Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆95Updated 3 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆131Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- Buggy script to play with GPOs☆119Updated 11 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Run Rubeus via Rundll32☆204Updated 5 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆247Updated 4 years ago
- Exchangelib wrapper for pentesting☆67Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆197Updated 4 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- Quick and dirty dynamic redirect.rules generator☆168Updated 3 years ago
- ☆158Updated 10 months ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆194Updated 4 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆210Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆185Updated 4 years ago
- Simple APPLocker bypass summary☆47Updated 7 years ago
- Python based BloodHound data importer☆148Updated 2 years ago
- LDAP Querying without the Suck☆110Updated last year
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- SpecterOps Presentations☆209Updated last week
- ☆120Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆113Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- ☆129Updated 2 years ago