tbhaxor / CSharp-and-InfosecLinks
This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.
☆60Updated 3 years ago
Alternatives and similar repositories for CSharp-and-Infosec
Users that are interested in CSharp-and-Infosec are comparing it to the libraries listed below
Sorting:
- ☆95Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 3 months ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆59Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- UI for creating LNKs☆104Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated last year
- Simple APPLocker bypass summary☆42Updated 6 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- ☆162Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 2 years ago
- ☆48Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- C# tool to discover low hanging fruits☆94Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆185Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago