3xpl01tc0d3r / CallidusLinks
☆163Updated 2 years ago
Alternatives and similar repositories for Callidus
Users that are interested in Callidus are comparing it to the libraries listed below
Sorting:
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- ☆95Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- ☆185Updated 4 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆202Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 5 years ago
- Run Rubeus via Rundll32☆202Updated 5 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆222Updated 4 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆140Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Updated 3 years ago
- Machine Learning Network Share Password Hunting Toolkit☆127Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆158Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆248Updated 4 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Updated 6 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 3 years ago
- ☆127Updated 5 years ago
- Presentation material presented by Outflank team members at public events.☆188Updated 7 months ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆9Updated 4 years ago
- ☆130Updated 4 years ago
- ☆193Updated 5 years ago
- An Insider Threat Toolkit☆152Updated 6 years ago
- Dump stuff without touching disk☆164Updated 4 years ago
- Collection of cyphers for bloodhound☆151Updated last year