☆575Jul 12, 2025Updated 10 months ago
Alternatives and similar repositories for jenkins-attack-framework
Users that are interested in jenkins-attack-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Notes about attacking Jenkins servers☆2,095Jul 10, 2024Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆147Jun 29, 2021Updated 4 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆616Mar 4, 2021Updated 5 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆234Jun 10, 2022Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆250Mar 31, 2021Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,114Sep 17, 2024Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆449Sep 7, 2022Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173May 5, 2021Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- ☆383Aug 19, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆484May 24, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆582Apr 25, 2023Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆722Aug 17, 2021Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 5 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆501Oct 8, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆271Jun 13, 2020Updated 5 years ago
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- Framework for Kerberos relaying☆948May 29, 2022Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆287Oct 29, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 5 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆542Sep 8, 2021Updated 4 years ago
- macOS Initial Access Payload Generator☆323Jan 10, 2024Updated 2 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Java RMI Vulnerability Scanner☆920Jul 3, 2024Updated last year
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 5 years ago
- ☆671Nov 17, 2021Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆856Dec 2, 2023Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Aug 5, 2022Updated 3 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago