3xploit666 / Shell-CustomLinks
this is a simple shell that has the ability to bypass defenses
☆13Updated last year
Alternatives and similar repositories for Shell-Custom
Users that are interested in Shell-Custom are comparing it to the libraries listed below
Sorting:
- Extra cmdlets to help with quering security related information from Azure☆13Updated 10 months ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- ☆42Updated 4 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- ☆33Updated 5 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆39Updated 4 years ago
- A cheatsheet and mindmap for CRTO certification☆9Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- ☆28Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- RDP Checker☆63Updated last year
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago