tommelo / lnk2pwn
Malicious Shortcut(.lnk) Generator
☆79Updated 6 years ago
Alternatives and similar repositories for lnk2pwn:
Users that are interested in lnk2pwn are comparing it to the libraries listed below
- Simple APPLocker bypass summary☆40Updated 6 years ago
- Malicious Shortcut(.lnk) Generator☆191Updated 6 years ago
- C# tool to discover low hanging fruits☆92Updated 2 years ago
- python spraying tools based on impacket lib☆52Updated 2 years ago
- ☆28Updated 2 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆96Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆89Updated 4 years ago
- ☆68Updated 4 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆26Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆79Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆106Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 5 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆147Updated 3 years ago
- ☆55Updated 11 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- Run Rubeus via Rundll32☆199Updated 4 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year