1d8 / macros
☆50Updated 4 years ago
Alternatives and similar repositories for macros:
Users that are interested in macros are comparing it to the libraries listed below
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Helper script for mangling CS payloads☆52Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- ☆19Updated 4 years ago
- with metasploit☆62Updated 4 years ago
- ☆31Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- eternalrelayx☆38Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated last year
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 weeks ago