There are no reviews yet. Be the first to send feedback to the community and the maintainers!
SharpSecDump
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.pySharpTransactedLoad
Load .net assemblies from memory while having them appear to be loaded from an on-disk location.PowerPriv
A Powershell implementation of PrivExchange designed to run under the current user's contextwmiServSessEnum
.net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systemsDayBird
Extension functionality for the NightHawk operator clientbackdoorLnkMacroStagerObfuscated
Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Backdoors are self-cleaning on execution.PreliminaryBackdoorLnkMacroStager
Original testing version of the backdoorLnkMacroStager - please reference backdoorLnkMacroStagerObfuscated or backdoorLnkMacroStagerCellEmbed for current versionsbackdoorLnkMacroStagerCellEmbed
Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Data is embedded in .xls cells and called in the macro to evade detection. Backdoors are self-cleaning on execution.Service-Executable-Permissions-Checker
Love Open Source and this site? Check out how you can help us