Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"
☆259Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for blackhat-usa-2022-demos
Users that are interested in blackhat-usa-2022-demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- In-memory token vault BOF for Cobalt Strike☆150Aug 18, 2022Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Sep 28, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆314Jul 8, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆255Jun 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- 远程创建任务计划工具☆191Apr 23, 2022Updated 4 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year
- ☆255Sep 28, 2023Updated 2 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆378May 24, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Mar 25, 2024Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆202Aug 7, 2024Updated last year
- Remote operations commands implemented using Beacon Object Files☆1,154Mar 5, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Nim Library for Offensive Security Development☆201Sep 4, 2023Updated 2 years ago
- UAC bypass for x64 Windows 7 - 11☆840Feb 2, 2026Updated 2 months ago
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆416Nov 10, 2024Updated last year
- A Poc on blocking Procmon from monitoring network events☆112Aug 7, 2025Updated 8 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated last week
- A basic emulation of an "RPC Backdoor"☆241Aug 25, 2022Updated 3 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 获取服务器或域控登录日志☆277Sep 8, 2023Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- Beacon Object Files for roasting Active Directory☆238Feb 21, 2022Updated 4 years ago
- The code is a pingback to the Dark Vortex blog:☆189Jan 26, 2023Updated 3 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆476Jul 6, 2024Updated last year
- ☆513Aug 14, 2022Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆719Mar 4, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- UAC bypass by abusing RPC and debug objects.☆628Oct 19, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Jun 18, 2024Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆242Jan 4, 2023Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- ☆119Aug 7, 2022Updated 3 years ago
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago