Brandon Kraycirik’s Post

View profile for Brandon Kraycirik, graphic

Senior Penetration Tester | OSWE | OSEP | OSCP | CRTO | eWPTX

Here is a list of C# binaries tools for multiple needs. 1. Windows Persistent Tool - https://lnkd.in/gqVXWHjD 2. Mimikatz DPAPI Alternative - https://lnkd.in/gPbtdppw 3. BloodHound Collector - https://lnkd.in/gX9zb9ep 4. Mimikatz Alternative (some sekurlsa and dcsync commands) - https://lnkd.in/ghW_9-77 5. PowerUp Alternative - https://lnkd.in/ghBNn_HV 6. PowerView Alternative - https://lnkd.in/gbjvX3pg 7. PortScanner Alternative - https://lnkd.in/gTfv5PX5 8. Winpeas - https://lnkd.in/gxd2BxVg 9. Privesc / System Info - https://lnkd.in/g3MPG2Ed 10. AD Exploitation - https://lnkd.in/gMBibmyf 11. Browser Credentials - https://lnkd.in/g2s6jR4p List of actions you can do that would increase in difficulty. 1. Practice with these tools on unpatched boxes. 2. Use these tools with a C2 framework to see if you can bypass defender. 3. Edit, obfuscate, and/or innovate to create a working version that will bypass defender without a C2. If you find the tools useful, please be sure to star the authors Github repos to increase visibility and to show appreciation. Extra Notes: Tool that may or may not help with initial compromise https://lnkd.in/gPudiU_M

GitHub - mandiant/SharPersist

GitHub - mandiant/SharPersist

github.com

Andri Kuka

Cyber-Sec Enthusiast

11mo

Thanks for sharing

See more comments

To view or add a comment, sign in

Explore topics