williamknows / SharpHound3Links
C# Data Collector for the BloodHound Project, Version 3
☆36Updated 3 years ago
Alternatives and similar repositories for SharpHound3
Users that are interested in SharpHound3 are comparing it to the libraries listed below
Sorting:
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- ☆29Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆24Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆98Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Updated 4 years ago
- ☆23Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆21Updated 4 years ago
- ☆70Updated 4 years ago
- ☆38Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 8 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Implementation of SpoolSample without rDLL☆28Updated 4 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆60Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 3 years ago
- ☆94Updated 3 years ago