vyrus001 / go-mimikatzLinks
A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.
☆625Updated 3 years ago
Alternatives and similar repositories for go-mimikatz
Users that are interested in go-mimikatz are comparing it to the libraries listed below
Sorting:
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- Dump ntds.dit really fast☆403Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆493Updated 4 years ago
- Shellcode wrapper with encryption for multiple target languages☆441Updated 8 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆346Updated 3 years ago
- Cobalt Strike kit for Lateral Movement☆675Updated 5 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 3 years ago
- Some useful scripts for CobaltStrike☆851Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,009Updated 7 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆549Updated 5 years ago
- Cobalt Strike kit for Persistence☆479Updated 5 years ago
- Cobalt Strike Shellcode Generator☆661Updated 8 months ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆868Updated 3 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,134Updated 2 years ago
- Load shellcode into a new process☆773Updated 4 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆519Updated 2 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆482Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,084Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,090Updated 2 years ago
- .NET Project for Attacking vCenter☆545Updated 3 years ago
- Cobalt Strike Python API☆300Updated 3 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆535Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,032Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆956Updated 7 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆688Updated 7 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆737Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆612Updated 3 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,034Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,163Updated 4 months ago