A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.
☆19Jun 24, 2021Updated 4 years ago
Alternatives and similar repositories for compressedCredBandit
Users that are interested in compressedCredBandit are comparing it to the libraries listed below
Sorting:
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- ☆66Dec 24, 2021Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Passive Security Tools Fingerprinting Framework☆75Mar 26, 2021Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- ☆99Sep 20, 2021Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- ☆21Feb 27, 2021Updated 5 years ago
- ☆24Jun 29, 2020Updated 5 years ago