-
GetWebDAVStatus Public
Determine if the WebClient Service (WebDAV) is running on a remote system
-
DayBird Public
Extension functionality for the NightHawk operator client
-
SharpSecDump Public
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
-
BloodHound Public
Forked from SpecterOps/BloodHound-LegacySix Degrees of Domain Admin
JavaScript GNU General Public License v3.0 UpdatedMar 30, 2022 -
SharpTransactedLoad Public
Load .net assemblies from memory while having them appear to be loaded from an on-disk location.
-
StandIn Public
Forked from xforcered/StandInStandIn is a small .NET35/45 AD post-exploitation toolkit
-
CVE-2020-1472 Public
Forked from SecuraBV/CVE-2020-1472Test tool for CVE-2020-1472
-
-
Rubeus Public
Forked from GhostPack/RubeusTrying to tame the three-headed dog.
C# Other UpdatedMay 19, 2020 -
impacket Public
Forked from fortra/impacketImpacket is a collection of Python classes for working with network protocols.
Python Other UpdatedJan 15, 2020 -
wmiServSessEnum Public
.net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems
-
Covenant Public
Forked from cobbr/CovenantCovenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and contro…
C# GNU General Public License v3.0 UpdatedFeb 7, 2019 -
PowerPriv Public
A Powershell implementation of PrivExchange designed to run under the current user's context
-
Empire Public
Forked from EmpireProject/EmpireEmpire is a PowerShell and Python post-exploitation agent.
PowerShell BSD 3-Clause "New" or "Revised" License UpdatedDec 24, 2017 -
Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through …
-
Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction native…
-
Original testing version of the backdoorLnkMacroStager - please reference backdoorLnkMacroStagerObfuscated or backdoorLnkMacroStagerCellEmbed for current versions
-