t94j0 / adexplorersnapshot-rs
☆66Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for adexplorersnapshot-rs
- Lateral Movement☆118Updated 11 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- ☆73Updated 6 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆104Updated 6 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆107Updated last month
- ☆88Updated 2 months ago
- ☆91Updated 8 months ago
- To audit the security of read-only domain controllers☆113Updated 11 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆155Updated 3 weeks ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆121Updated 8 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆49Updated this week
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆57Updated 2 months ago
- ☆176Updated last month
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- ☆116Updated 2 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆126Updated last week
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆130Updated last month
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆87Updated 9 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆130Updated last month
- ☆77Updated last year
- Lateral Movement via the .NET Profiler☆73Updated 5 months ago
- A C# port from Invoke-GhostTask☆109Updated 10 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆69Updated 9 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆76Updated last month
- Just another C2 Redirector using CloudFlare.☆78Updated 5 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- ☆117Updated last year