Here is a list of C# binaries tools for multiple needs. 1. Windows Persistent Tool - https://lnkd.in/gqVXWHjD 2. Mimikatz DPAPI Alternative - https://lnkd.in/gPbtdppw 3. BloodHound Collector - https://lnkd.in/gX9zb9ep 4. Mimikatz Alternative (some sekurlsa and dcsync commands) - https://lnkd.in/ghW_9-77 5. PowerUp Alternative - https://lnkd.in/ghBNn_HV 6. PowerView Alternative - https://lnkd.in/gbjvX3pg 7. PortScanner Alternative - https://lnkd.in/gTfv5PX5 8. Winpeas - https://lnkd.in/gxd2BxVg 9. Privesc / System Info - https://lnkd.in/g3MPG2Ed 10. AD Exploitation - https://lnkd.in/gMBibmyf 11. Browser Credentials - https://lnkd.in/g2s6jR4p List of actions you can do that would increase in difficulty. 1. Practice with these tools on unpatched boxes. 2. Use these tools with a C2 framework to see if you can bypass defender. 3. Edit, obfuscate, and/or innovate to create a working version that will bypass defender without a C2. If you find the tools useful, please be sure to star the authors Github repos to increase visibility and to show appreciation. Extra Notes: Tool that may or may not help with initial compromise https://lnkd.in/gPudiU_M
Well done that man! 😎
Cyber-Sec Enthusiast
11moThanks for sharing