Category: Post Exploitation

open-source post-exploitation framework

byob: open-source post-exploitation framework

BYOB BYOB is an open-source post-exploitation framework for students, researchers, and developers. It includes features such as: Pre-built C2 server Custom payload generator 12 post-exploitation modules It is designed to allow students and developers...

StandIn

StandIn v1.3 releases: NET35/45 AD post-exploitation toolkit

StandIn StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution to perform resource-based constrained delegation. However, StandIn quickly ballooned to include a number of...

WDigest credential caching

WdToggle: enable WDigest credential caching

WdToggle A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and circumvent Credential Guard (if enabled). Additional guidance can be found in this blog post. Background This PoC code is...

SOCKS tunnel

rpc2socks: enables a SOCKS tunnel via a Windows host

rpc2socks rpc2socks is a client-server solution that allows us to drop and remotely run a custom RPC + SOCKS-through-SMB server application on a Windows target, from a Unix or Windows host. The client-server pair can be used as a regular...