timwhitez / iSliver
Learning notes of amazing Sliver C2 project.
☆24Updated last year
Related projects ⓘ
Alternatives and complementary repositories for iSliver
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆31Updated last year
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆21Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated 10 months ago
- Stop Windows Defender programmatically☆15Updated 2 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆20Updated last year
- ☆45Updated 4 months ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆31Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- ☆12Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- desktop screenshot☆29Updated last year
- Load ssp dll golang implementation☆17Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆43Updated last year
- Cs-Sleep-Mask-Fiber☆16Updated last month
- load assembly executable file in memory☆37Updated last year
- A simple program in Go to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authent…☆14Updated 2 months ago
- ☆30Updated last year
- query specific user and login IP from remote machine☆17Updated last year
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- More EFS coerced authentication method with PetitPotam.py☆20Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆41Updated 2 years ago
- dump lsass☆36Updated 2 years ago
- ☆12Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆60Updated 2 years ago
- resource-based constrained delegation RBCD☆43Updated 2 years ago