y00ga-sec / Forensike
Remotely dump NT hashes through Windows Crash dumps
☆26Updated 3 months ago
Alternatives and similar repositories for Forensike:
Users that are interested in Forensike are comparing it to the libraries listed below
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆32Updated 10 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- ☆24Updated 2 years ago
- ☆19Updated 8 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- ☆47Updated 2 years ago
- ☆18Updated 4 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- A VSCode plugin to assist with BOF development.☆33Updated 6 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 7 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- ☆23Updated 9 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆24Updated 6 months ago
- ☆29Updated 2 years ago
- in-process powershell runner for BRC4☆44Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆18Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 9 months ago
- ☆28Updated 8 months ago
- SAM Dumping in C#☆42Updated last month
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Validates priv escalation of AD trusts☆35Updated 2 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆51Updated last week
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 10 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 6 months ago