Search tool to find specific files containing specific words, i.e. files containing passwords..
☆744Nov 18, 2020Updated 5 years ago
Alternatives and similar repositories for SauronEye
Users that are interested in SauronEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆376Sep 20, 2025Updated 6 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆842Dec 2, 2023Updated 2 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆844Oct 3, 2021Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,091Mar 22, 2024Updated 2 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- ☆1,532Aug 11, 2023Updated 2 years ago
- C# Script used for Red Team☆723Nov 16, 2021Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- ☆668Nov 17, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479May 24, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆303Mar 4, 2020Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆935Nov 11, 2024Updated last year
- Extract credentials from lsass remotely☆2,184Dec 24, 2025Updated 3 months ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆540Sep 18, 2022Updated 3 years ago
- SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.☆314Sep 30, 2019Updated 6 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 3 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,315Dec 15, 2020Updated 5 years ago
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 3 years ago