two06 / CerealKiller
.NET deserialization hunter
☆66Updated last month
Related projects: ⓘ
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆71Updated 5 months ago
- Lateral Movement☆117Updated 10 months ago
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆65Updated last month
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆18Updated last month
- ZSH integration for Impacket☆56Updated last week
- ☆40Updated 2 years ago
- ☆90Updated 6 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 6 months ago
- ☆60Updated this week
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆80Updated 3 months ago
- ☆101Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆54Updated 2 weeks ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- Execute commands in other Sessions☆74Updated last month
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated 10 months ago
- ☆79Updated 2 weeks ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆12Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆19Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆59Updated 3 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆147Updated 10 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆62Updated 5 months ago
- ☆65Updated this week
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆79Updated 5 months ago
- Library of BOFs to interact with SQL servers☆143Updated 3 months ago
- ☆76Updated 5 months ago