3xploit666 / Shell-Custom
this is a simple shell that has the ability to bypass defenses
☆13Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Shell-Custom
- Extra cmdlets to help with quering security related information from Azure☆13Updated last month
- ☆46Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 3 weeks ago
- This repo will contain some basic pentest/RT commands.☆36Updated 2 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆19Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆8Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆40Updated 4 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- Notification webhook for GoPhish☆52Updated 5 months ago
- ☆16Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 4 years ago
- ☆25Updated 2 years ago
- ☆12Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆19Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 4 months ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- ☆41Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆26Updated 2 years ago
- ☆37Updated 6 months ago