y00ga-sec / TrustifyLinks
Attack Active Directory Trusts with a single tool
☆12Updated 5 months ago
Alternatives and similar repositories for Trustify
Users that are interested in Trustify are comparing it to the libraries listed below
Sorting:
- Remotely dump NT hashes through Windows Crash dumps☆27Updated 7 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆10Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated 2 months ago
- A VSCode plugin to assist with BOF development.☆37Updated 10 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- ☆29Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆11Updated 10 months ago
- ☆25Updated 3 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 9 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 10 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Repository for dirty scripts and PoCs☆18Updated 4 months ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Updated 4 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆17Updated 2 weeks ago
- BypassCredGuard CS BOF☆42Updated 5 months ago
- ☆30Updated 3 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 11 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆20Updated last year
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- SAM Dumping in C#☆48Updated 5 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆24Updated 2 weeks ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Library of BOFs to interact with SQL servers☆22Updated 2 months ago