xpn / RandomTSScripts
Collection of random RedTeam scripts.
☆200Updated last year
Alternatives and similar repositories for RandomTSScripts:
Users that are interested in RandomTSScripts are comparing it to the libraries listed below
- ☆171Updated 4 months ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆195Updated 9 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆287Updated 4 months ago
- Evasive Golang Loader☆129Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆161Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆287Updated last year
- My implementation of the GIUDA project in C++☆180Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆159Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- ☆274Updated last year
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆183Updated last month
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆289Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- ☆116Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆232Updated 3 months ago
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 7 months ago
- ☆207Updated 5 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆396Updated 9 months ago
- ☆243Updated 2 years ago
- Continuous password spraying tool☆174Updated 3 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆149Updated last week
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆184Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago