thiagopeixoto / mystique-self-injection
An improvement and a different approach to Mockingjay Self-Injection.
☆34Updated 11 months ago
Alternatives and similar repositories for mystique-self-injection:
Users that are interested in mystique-self-injection are comparing it to the libraries listed below
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- ☆18Updated 4 months ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A simple to use single-include Windows API resolver☆21Updated 9 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 3 weeks ago
- DFSCoerce exe revisited version with custom authentication☆39Updated last year
- Scripts to interact with Microsoft Graph APIs☆36Updated 5 months ago
- BOF for C2 framework☆41Updated 5 months ago
- ☆48Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated this week
- ☆23Updated 11 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆23Updated last month
- A simple rpc2socks alternative in pure Go.☆28Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated 2 months ago
- ☆21Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated last month
- Threadless Injection Payload Toolkit☆12Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- Enumerate the Domain for Readable and Writable Shares☆17Updated 2 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆19Updated last year
- ☆11Updated 2 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆44Updated 4 months ago