Stars
Scan for and exploit the zerologon vulnerability.
Situational Awareness commands implemented using Beacon Object Files
This repo contains samples that demonstrate the API used in Windows classic desktop applications.
🐧 Abuse of Google Colab for cracking hashes.
A Kerberos implementation built entirely in managed code.
A tool to create a JScript file which loads a .NET v2 assembly from memory.
This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).
GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects
C# .NET Assembly for interacting with File Object DACLs
AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to…
Search for potential frontable domains
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
mkaring / ConfuserEx
Forked from yck1509/ConfuserExAn open-source, free protector for .NET applications
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Extract credentials from lsass remotely
A tool mainly to erase specified records from Windows event logs, with additional functionalities.
The ultimate WinRM shell for hacking/pentesting
Custom Query list for the Bloodhound GUI based off my cheatsheet
Covenant is a collaborative .NET C2 framework for red teamers.
Microsoft signed ActiveDirectory PowerShell module
Identifies the bytes that Microsoft Defender flags on.