0xBienCuit / InfraRed-AWS
☆58Updated 5 months ago
Alternatives and similar repositories for InfraRed-AWS:
Users that are interested in InfraRed-AWS are comparing it to the libraries listed below
- ☆82Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 9 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆61Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated this week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆87Updated last month
- A Moodle Scanner☆39Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆97Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆159Updated 3 months ago
- PowerShell Reverse Shell☆61Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Repo for all my exploits/PoCs☆48Updated 3 weeks ago
- BloodHound PowerShell client☆50Updated last month
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆40Updated 2 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Deploy a phishing infrastructure on the fly.☆68Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆107Updated 10 months ago
- Lifetime AMSI bypass.☆35Updated 8 months ago
- Simple netexec wraper with html repport☆17Updated 9 months ago
- ☆38Updated last month
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆79Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆93Updated last year
- ☆51Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year