When CactusTorch meets WebDavDelivery and obfuscation
☆63Sep 19, 2017Updated 8 years ago
Alternatives and similar repositories for ObfuscateCactusTorch
Users that are interested in ObfuscateCactusTorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- ☆84May 19, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆110May 14, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Collection of C# scripts☆341Feb 8, 2017Updated 9 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆124Sep 6, 2022Updated 3 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,014Jul 3, 2018Updated 7 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Updated version of C2K☆51Mar 22, 2018Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago