vyrus001 / go-mimikatz
A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.
☆617Updated 2 years ago
Alternatives and similar repositories for go-mimikatz:
Users that are interested in go-mimikatz are comparing it to the libraries listed below
- Convert Cobalt Strike profiles to modrewrite scripts☆594Updated 2 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆441Updated 2 years ago
- Shellcode wrapper with encryption for multiple target languages☆436Updated 8 years ago
- Cobalt Strike kit for Lateral Movement☆663Updated 5 years ago
- Dump ntds.dit really fast☆390Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆483Updated 4 years ago
- Some useful scripts for CobaltStrike☆844Updated 4 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆831Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,003Updated 6 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆541Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆979Updated 10 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,073Updated last year
- Cobalt Strike Shellcode Generator☆652Updated 2 months ago
- Cobalt Strike kit for Persistence☆474Updated 5 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆476Updated 2 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆330Updated 2 years ago
- Cobalt Strike Python API☆298Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,052Updated 9 months ago
- Standalone binaries for Linux/Windows of Impacket's examples☆726Updated last year
- RottenPotato local privilege escalation from service account to SYSTEM☆669Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆932Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,476Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,006Updated 5 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,076Updated last year
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆995Updated 3 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆500Updated 2 years ago
- ☆518Updated 2 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆738Updated 4 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆764Updated last year
- Load shellcode into a new process☆771Updated 3 years ago