sud0Ru / impacket-dcomLinks
Adjusted version of the impacket-dcomexec script to work against Windows 10
☆18Updated 2 months ago
Alternatives and similar repositories for impacket-dcom
Users that are interested in impacket-dcom are comparing it to the libraries listed below
Sorting:
- ☆52Updated 2 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- ☆46Updated last week
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Updated last year
- ☆54Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- ☆49Updated 6 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- ☆82Updated last year
- ☆36Updated 9 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆53Updated 3 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆44Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated last week
- SAM Dumping in C#☆54Updated 2 weeks ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆83Updated last month
- Using LNK files and user input simulation to start processes under explorer.exe☆30Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- a BOF implementation of various registry persistence methods☆92Updated last month
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated 10 months ago
- ☆56Updated 5 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 3 months ago
- Bypassing Amsi using LdrLoadDll☆47Updated 11 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- ☆99Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆51Updated last week
- Tool to bypass LSA Protection (aka Protected Process Light)☆62Updated 11 months ago