• Stars
    star
    32
  • Rank 798,033 (Top 16 %)
  • Language
    C#
  • Created about 5 years ago
  • Updated almost 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

.net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems

More Repositories

1

SharpSecDump

.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
C#
571
star
2

SharpTransactedLoad

Load .net assemblies from memory while having them appear to be loaded from an on-disk location.
C#
157
star
3

PowerPriv

A Powershell implementation of PrivExchange designed to run under the current user's context
PowerShell
123
star
4

GetWebDAVStatus

Determine if the WebClient Service (WebDAV) is running on a remote system
C
117
star
5

DayBird

Extension functionality for the NightHawk operator client
C#
26
star
6

backdoorLnkMacroStagerObfuscated

Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Backdoors are self-cleaning on execution.
Python
17
star
7

PreliminaryBackdoorLnkMacroStager

Original testing version of the backdoorLnkMacroStager - please reference backdoorLnkMacroStagerObfuscated or backdoorLnkMacroStagerCellEmbed for current versions
Python
5
star
8

backdoorLnkMacroStagerCellEmbed

Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Data is embedded in .xls cells and called in the macro to evade detection. Backdoors are self-cleaning on execution.
Python
5
star
9

Service-Executable-Permissions-Checker

PowerShell
3
star