BC-SECURITY / DeathStarPlugin
Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common offensive tactics, techniques, and procedures (TTPs).
☆15Updated 8 months ago
Related projects: ⓘ
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- ☆23Updated last year
- ☆42Updated 2 months ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆25Updated 6 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- ☆50Updated 11 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆15Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆53Updated 9 months ago
- ☆30Updated this week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 6 months ago
- ☆69Updated 10 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆11Updated 10 months ago
- ☆45Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Items related to the RedELK workshop given at security conferences☆25Updated 11 months ago
- My BloodHound custom queries☆22Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago