thelikes / slivercloak
PoC framework for Sliver compilation
☆14Updated 4 months ago
Alternatives and similar repositories for slivercloak
Users that are interested in slivercloak are comparing it to the libraries listed below
Sorting:
- ☆44Updated last month
- A python script that automates a C2 Profile build☆41Updated last month
- Impacket pre-compiled binaries☆16Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆27Updated 4 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆33Updated last year
- ☆54Updated 3 months ago
- ☆23Updated this week
- Lifetime AMSI bypass.☆35Updated 3 weeks ago
- ☆50Updated 6 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated last week
- Adversary Emulation Framework☆98Updated 9 months ago
- a port of privkit bof for havoc☆23Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆25Updated 3 months ago
- Your Skyfall Infrastructure Pack☆69Updated last week
- AzureAD beacon object files☆119Updated 5 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 10 months ago
- ☆121Updated last week
- Python3 rewrite of AsOutsider features of AADInternals☆47Updated 4 months ago
- Windows Thread Pool Injection Havoc Implementation☆29Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated last month
- Sniffing files generator☆56Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆81Updated last week
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 8 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆75Updated 2 months ago
- ForsHops☆131Updated last month
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆33Updated last month
- ☆71Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year