0xShaolin / CMD_Bypass
Is command prompt blocked on your school/work computers? Here is an easy fix!
☆19Updated 5 years ago
Related projects: ⓘ
- ☆18Updated this week
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 9 years ago
- A C# DLL to Dump LSA Secrets☆56Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Simple C2 over the Trello API☆37Updated last year
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆77Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- ☆15Updated this week
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Random code snippets☆9Updated 10 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- PoC code from blog☆16Updated 4 years ago
- ☆24Updated 6 years ago
- Methods of C2☆21Updated 9 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆0Updated 2 years ago
- Generic malicious browser check written in C#☆12Updated 8 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Updated 3 weeks ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆15Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- ☆18Updated this week
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago