y00ga-sec / TrustifyLinks
Attack Active Directory Trusts with a single tool
☆13Updated 9 months ago
Alternatives and similar repositories for Trustify
Users that are interested in Trustify are comparing it to the libraries listed below
Sorting:
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆48Updated 7 months ago
- Remotely dump NT hashes through Windows Crash dumps☆36Updated 11 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 5 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆13Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Updated last year
- A VSCode plugin to assist with BOF development.☆37Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆31Updated last month
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 4 months ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- BypassCredGuard CS BOF☆47Updated 9 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆27Updated last year
- Library of BOFs to interact with SQL servers☆23Updated 6 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- SAM Dumping in C#☆54Updated 9 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆43Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆31Updated 2 years ago
- BOF to terminate a process via PID as argument☆27Updated last month
- Sliver agent rewritten in C++☆48Updated last year
- Groovy Post Exploitation☆19Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆16Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Beacon Object Files.☆37Updated last year
- ☆18Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆30Updated 9 months ago
- CVE-2024-40711-exp☆42Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Updated 8 months ago