usdAG / SharpLink
Create file system symbolic links from low privileged user accounts within PowerShell
☆94Updated 2 years ago
Alternatives and similar repositories for SharpLink:
Users that are interested in SharpLink are comparing it to the libraries listed below
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- ☆39Updated 2 years ago
- A C# port of the MinHook API hooking library☆52Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆142Updated 11 months ago
- Managed code hooking template.☆131Updated 3 years ago
- ☆145Updated 2 years ago
- ☆88Updated 2 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆188Updated 5 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆192Updated 3 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated 11 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆134Updated 7 months ago
- ☆107Updated 9 months ago
- ☆58Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 3 years ago
- Exploring in-memory execution of .NET☆137Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 10 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- Offensive tool for fileless lateral movement on Windows networks☆25Updated last year
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago