Skip to content
View vflame6's full-sized avatar
👾
👾

Block or report vflame6

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
60 stars written in C#
Clear filter

Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel

C# 692 86 Updated Sep 3, 2025

Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)

C# 687 95 Updated May 7, 2025

Get file less command execution for lateral movement.

C# 630 90 Updated Jun 3, 2022

Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

C# 620 97 Updated May 8, 2025

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 580 62 Updated Mar 19, 2024

.NET Project for Attacking vCenter

C# 553 64 Updated Nov 11, 2021

.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.

C# 537 104 Updated Jan 5, 2019

A tool to exploit .NET Remoting Services

C# 528 112 Updated Jul 31, 2024

Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.

C# 509 66 Updated Aug 7, 2024

A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.

C# 473 81 Updated Oct 14, 2022

SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.

C# 425 47 Updated May 16, 2024

A User Impersonation tool - via Token or Shellcode injection

C# 419 75 Updated May 21, 2022

Materials for the workshop "Red Team Ops: Havoc 101"

C# 387 51 Updated Oct 6, 2024

Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain

C# 366 55 Updated Sep 20, 2025

Abusing Azure services over C2

C# 364 34 Updated May 28, 2025

A BloodHound collector for Microsoft Configuration Manager

C# 350 21 Updated Jul 7, 2025

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.

C# 312 32 Updated Aug 7, 2024

Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it w…

C# 299 44 Updated Apr 25, 2023

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 266 30 Updated Dec 27, 2024

Run Rubeus via Rundll32

C# 200 32 Updated Apr 25, 2020

DAFT: Database Audit Framework & Toolkit

C# 180 46 Updated Aug 11, 2021

Telegram Desktop Session Stealer

C# 173 37 Updated May 20, 2019

An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it.

C# 166 18 Updated Oct 9, 2024

Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking

C# 132 16 Updated Jul 2, 2025

Lateral Movement

C# 124 14 Updated Nov 14, 2023

A variety of AV evasion techniques written in C# for practice.

C# 97 18 Updated Apr 19, 2021

Programmatically start WebClient from an unprivileged session to enable that juicy privesc.

C# 76 14 Updated Feb 8, 2023

a small wiper malware programmed in c#

C# 58 11 Updated Nov 17, 2022