Bl4ckM1rror / OctopusKeylogger
☆14Updated this week
Related projects: ⓘ
- ☆16Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆20Updated 2 years ago
- ☆20Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆31Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 2 years ago
- RATs library 2003 to present☆11Updated 11 months ago
- Recon-ng modules for basic OSINT.☆9Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆21Updated 2 years ago
- ☆26Updated this week
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 5 months ago
- MacroExploit use in excel sheet☆20Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆26Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆16Updated 3 years ago
- ☆15Updated 5 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆11Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Yet, Another Packer/Loader☆25Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆22Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- Shell hunter for AF☆34Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- wsnet☆23Updated last month
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Updated 2 years ago
- A collection of my presentation materials.☆16Updated 4 months ago