soufianetahiri / CitrixSecureAccessAuthCookieDumpView external linksLinks
Dump Citrix Secure Access auth cookie from the process memory
☆76Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for CitrixSecureAccessAuthCookieDump
Users that are interested in CitrixSecureAccessAuthCookieDump are comparing it to the libraries listed below
Sorting:
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated last year
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 2 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆131Nov 10, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Mar 8, 2023Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- ☆126Jun 28, 2023Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆82May 23, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- ☆118Nov 21, 2024Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆265Nov 18, 2022Updated 3 years ago
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆439Jan 4, 2025Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆259May 10, 2023Updated 2 years ago
- ☆164Dec 30, 2022Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- ☆113Oct 10, 2022Updated 3 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago