thelikes / slivercloakLinks
PoC framework for Sliver compilation
☆15Updated 6 months ago
Alternatives and similar repositories for slivercloak
Users that are interested in slivercloak are comparing it to the libraries listed below
Sorting:
- ForsHops☆145Updated 4 months ago
- ☆47Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆85Updated 11 months ago
- AzureAD beacon object files☆121Updated 7 months ago
- Local SYSTEM auth trigger for relaying☆134Updated 2 weeks ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆80Updated this week
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- ☆132Updated last year
- A Python POC for CRED1 over SOCKS5☆151Updated 10 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆120Updated last month
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆148Updated 5 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆115Updated 2 weeks ago
- Adversary Emulation Framework☆121Updated last month
- ☆140Updated 3 months ago
- a port of privkit bof for havoc☆23Updated last year
- OAuth Device Code Phishing Toolkit☆65Updated 3 months ago
- Lateral movement with DCOM DLL hijacking☆133Updated last month
- ☆57Updated 5 months ago
- ☆208Updated last year
- ☆220Updated 9 months ago
- A python script that automates a C2 Profile build☆43Updated 4 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated last week
- Local SYSTEM auth trigger for relaying - X☆116Updated last week
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆100Updated 2 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆157Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 6 months ago
- ☆29Updated 11 months ago
- ☆83Updated last year
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆77Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆159Updated last month