SharpView
Domain explorer
A C# port of a domain enumeration and privilege escalation tool
C# implementation of harmj0y's PowerView
1k stars
22 watching
189 forks
Language: C#
last commit: 8 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
tevora-threat/aggressor-powerview | Provides a user interface for @harmjoy's PowerView script in Cobalt Strike | 66 |
tevora-threat/powerview3-aggressor | A Cobalt Strike script menu for PowerView and SharpView | 127 |
klezvirus/sharpselfdelete | Implementation of a Windows exploitation technique using P/Invoke to delete processes from memory | 147 |
ghostpack/sharpup | A C# port of various PowerUp functionality for vulnerability checking | 1,261 |
sharprepository/sharprepository | A C# repository framework supporting multiple databases and caching options. | 658 |
anthemtotheego/sharpsploitconsole | A tool designed to embed and interact with SharpSploit, a C# DLL that combines various infosec techniques. | 178 |
b4rtik/sharpkatz | A porting of mimikatz commands for Windows credential extraction and manipulation | 974 |
fuzzysecurity/sharp-suite | A toolset for threat emulation and code injection using C#. | 1,114 |
svdwi/bluebox | Analyzes and enriches threat intelligence data from various sources to help detect malicious files, URLs, and domains. | 38 |
facticiusvir/sharpvk | C# bindings for the Vulkan API and SPIR-V shader compilation | 149 |
tevora-threat/c2_reporter | Analyzes logs from Cobalt and Empire to generate an Excel report on C2 activity, sessions, and credentials. | 20 |
djhohnstein/sharpchromium | Tool to extract data from Chromium-based browsers | 692 |
f3eev/sharkexec | A C# toolkit designed to extract credentials and browsing history from Windows systems. | 295 |
elinamllc/sharpvectors | A C# library for parsing and rendering SVG files in WPF applications. | 718 |
antoniococo/sharpyshell | A tool designed to facilitate post-exploitation activities on compromised IIS web servers by generating and interacting with an obfuscated C# webshell. | 917 |