t3hbb / NSGenCS
Extendable payload obfuscation and delivery framework
☆143Updated 2 years ago
Alternatives and similar repositories for NSGenCS:
Users that are interested in NSGenCS are comparing it to the libraries listed below
- Pass the Hash to a named pipe for token Impersonation☆141Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆223Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆178Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆147Updated 3 years ago
- ☆139Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago
- Perform DCSync operation without mimikatz☆142Updated 4 months ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Updated 4 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- My CobaltStrike BOFS☆163Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- ☆157Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆152Updated last year
- UI for creating LNKs☆102Updated 3 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆129Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆135Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- C# version of Powermad☆162Updated last year
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆178Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆325Updated 2 years ago
- ☆167Updated 3 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆55Updated 4 years ago