A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
-
Updated
Apr 8, 2023 - C#
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
C# C2 Framework centered around Stage 1 operations
.NET 4.0 Remote Desktop Manager Password Gatherer
Six Degrees of Enterprise Domain Admin
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Windows anti-forensics made easy
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
Demo for spawning processes under a specified parent PID.
AzureAD Infra data collectors in CLI and binary executable form.
A single stored procedure transformed into a multi-functional tool like a Swiss Army knife after exploitation — an attack-focused SQL CLR toolset: file system control, payload preparation, privilege escalation, and shellcode/assembly loaders.
Computer object takeover through Resource-Based Constrained Delegation msDS-AllowedToActOnBehalfOfOtherIdentity
Drop-in runas.exe replacement with DACL handling, netonly support, and real-time I/O passthrough.
Windows Local Privilege Escalation Tool. Exploits COM server hijacking to elevate privileges from local service to SYSTEM.
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."