0xsp-SRD / PAS-mini-c2c-Links
☆12Updated 2 years ago
Alternatives and similar repositories for PAS-mini-c2c-
Users that are interested in PAS-mini-c2c- are comparing it to the libraries listed below
Sorting:
- Execute embedded Mimikatz☆13Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆34Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- ☆31Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆25Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- Python3 tool to perform password spraying using RDP☆17Updated last year
- ☆16Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆20Updated 5 years ago
- My nim learning experiments☆11Updated 2 years ago
- ☆12Updated 3 years ago