1d8 / macros
☆50Updated 4 years ago
Alternatives and similar repositories for macros:
Users that are interested in macros are comparing it to the libraries listed below
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆19Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- eternalrelayx☆38Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Helper script for mangling CS payloads☆52Updated 5 years ago
- ☆31Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- ☆52Updated 5 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆27Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- initial commit☆43Updated 3 months ago