y00ga-sec / TrustifyLinks
Attack Active Directory Trusts with a single tool
☆14Updated 11 months ago
Alternatives and similar repositories for Trustify
Users that are interested in Trustify are comparing it to the libraries listed below
Sorting:
- Collection of self-made Red Team tools that have come in handy☆12Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆34Updated last year
- Beacon Object Files.☆36Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 9 months ago
- Groovy Post Exploitation☆19Updated last year
- Library of BOFs to interact with SQL servers☆23Updated 8 months ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 2 weeks ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Updated last year
- BypassCredGuard CS BOF☆48Updated 11 months ago
- ☆31Updated 3 years ago
- ☆10Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 6 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆30Updated last year
- ☆18Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆42Updated 5 months ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆37Updated 9 months ago
- AV/EDR killer using BYOVD technique☆43Updated last year
- CVE-2024-40711-exp☆42Updated last year
- An Exercice for Red Team to Reverse & Exploit, that's a valide BYOVD Killer, not HVCI Blocklisted, and not in LOLBIN☆34Updated 5 months ago
- Exploit for CVE-2024-0402 in Gitlab☆14Updated 9 months ago