G0ldenGunSec

G0ldenGunSec

Geek Repo

Github PK Tool:Github PK Tool

G0ldenGunSec's repositories

SharpSecDump

.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py

Language:C#License:BSD-3-ClauseStargazers:571Issues:10Issues:2

SharpTransactedLoad

Load .net assemblies from memory while having them appear to be loaded from an on-disk location.

Language:C#License:BSD-3-ClauseStargazers:158Issues:3Issues:0

PowerPriv

A Powershell implementation of PrivExchange designed to run under the current user's context

Language:PowerShellLicense:BSD-3-ClauseStargazers:124Issues:3Issues:0

GetWebDAVStatus

Determine if the WebClient Service (WebDAV) is running on a remote system

wmiServSessEnum

.net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems

Language:C#Stargazers:32Issues:1Issues:0

DayBird

Extension functionality for the NightHawk operator client

Language:C#Stargazers:26Issues:2Issues:0

backdoorLnkMacroStagerObfuscated

Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Backdoors are self-cleaning on execution.

Language:PythonStargazers:18Issues:0Issues:0

backdoorLnkMacroStagerCellEmbed

Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is done to obtain a shell via follow-up user interaction natively through powershell, in order to evade tools that monitor process execution. Data is embedded in .xls cells and called in the macro to evade detection. Backdoors are self-cleaning on execution.

Language:PythonStargazers:5Issues:0Issues:0

PreliminaryBackdoorLnkMacroStager

Original testing version of the backdoorLnkMacroStager - please reference backdoorLnkMacroStagerObfuscated or backdoorLnkMacroStagerCellEmbed for current versions

Language:PythonStargazers:5Issues:0Issues:0
Language:PowerShellStargazers:3Issues:0Issues:0

CVE-2020-1472

Test tool for CVE-2020-1472

Language:PythonLicense:MITStargazers:1Issues:0Issues:0
Language:C#Stargazers:1Issues:0Issues:0

StandIn

StandIn is a small .NET35/45 AD post-exploitation toolkit

Language:C#Stargazers:1Issues:0Issues:0

BloodHound

Six Degrees of Domain Admin

Language:JavaScriptLicense:GPL-3.0Stargazers:0Issues:0Issues:0

Covenant

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.

Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

Empire

Empire is a PowerShell and Python post-exploitation agent.

Language:PowerShellLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

impacket

Impacket is a collection of Python classes for working with network protocols.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Rubeus

Trying to tame the three-headed dog.

Language:C#License:NOASSERTIONStargazers:0Issues:0Issues:0