3rkut / UsefulSources
Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes
☆26Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for UsefulSources
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆33Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- ☆23Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- Windows Privilege Escalation (Modified RottePotato)☆12Updated 6 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆16Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- ☆16Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆19Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- treafik fronted c2 examples☆26Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Execute Mimikatz with different technique☆50Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆16Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 3 years ago
- ☆15Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆14Updated last year
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆16Updated 7 years ago
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- C2 and Post Exploitation Code☆34Updated last month
- ☆12Updated 3 years ago
- ☆35Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Source Code Management Attack Toolkit☆10Updated 2 years ago