0xAbdullah / Offensive-SnippetsLinks
A repository with my code snippets for research/education purposes.
☆51Updated 2 years ago
Alternatives and similar repositories for Offensive-Snippets
Users that are interested in Offensive-Snippets are comparing it to the libraries listed below
Sorting:
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 9 months ago
- ☆48Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- in-process powershell runner for BRC4☆47Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆84Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- C# havoc implant☆101Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- ☆59Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆60Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆70Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- ☆28Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Remote Template Injection Toolkit☆43Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Sniffing files generator☆59Updated 7 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago