usdAG / SharpLink
Create file system symbolic links from low privileged user accounts within PowerShell
☆94Updated 2 years ago
Alternatives and similar repositories for SharpLink:
Users that are interested in SharpLink are comparing it to the libraries listed below
- ☆38Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆142Updated 11 months ago
- A fake AMSI Provider which can be used for persistence.☆148Updated 3 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆105Updated 2 years ago
- ☆88Updated 2 years ago
- Find .net assemblies locally☆111Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- Find DLLs with RWX section☆79Updated last year
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- Managed code hooking template.☆131Updated 3 years ago
- Implant drop-in for EDR testing☆135Updated last year
- Offensive tool for fileless lateral movement on Windows networks☆25Updated 11 months ago
- Parse SDDL strings☆35Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆133Updated 7 months ago
- ☆75Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- ☆145Updated 2 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- ☆57Updated 3 years ago
- Python module for running BOFs☆68Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆112Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- ☆72Updated 8 months ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆90Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆62Updated 2 years ago