thiagomayllart / Covenant_AlternateView external linksLinks
Covenant is a collaborative .NET C2 framework for red teamers.
☆22Sep 27, 2020Updated 5 years ago
Alternatives and similar repositories for Covenant_Alternate
Users that are interested in Covenant_Alternate are comparing it to the libraries listed below
Sorting:
- ☆62Aug 7, 2020Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Jul 21, 2019Updated 6 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 3 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Oct 30, 2024Updated last year
- exp for CVE-2019-0887☆18Jan 15, 2021Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- ☆18May 9, 2020Updated 5 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- Ghidra data type archive for Windows driver analysis☆29Oct 10, 2024Updated last year
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- ☆42Jun 1, 2025Updated 8 months ago
- ☆73Oct 24, 2021Updated 4 years ago
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆34Jul 8, 2025Updated 7 months ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆41Aug 11, 2023Updated 2 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆254Oct 13, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- A simple but useful project maybe help you reverse Windows.☆41Apr 2, 2024Updated last year
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago