ChaitanyaHaritash / IllusiveFog
Windows Administrator level Implant.
☆48Updated 3 months ago
Alternatives and similar repositories for IllusiveFog:
Users that are interested in IllusiveFog are comparing it to the libraries listed below
- ☆45Updated 2 months ago
- Lifetime AMSI bypass.☆35Updated 6 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 9 months ago
- Source code and examples for PassiveAggression.☆54Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 6 months ago
- ☆48Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆41Updated last month
- malleable profile generator GUI for Havoc☆56Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- BloodHound PowerShell client☆48Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 6 months ago
- Deploy a phishing infrastructure on the fly.☆63Updated 3 weeks ago
- Tool to extract username and password of current user from PanGPA in plaintext☆80Updated 3 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- Adversary Emulation Framework☆61Updated 5 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆84Updated 11 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆29Updated last month
- ☆54Updated 2 months ago
- ☆92Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 3 months ago
- Our Tips&Tricks☆39Updated this week
- Evade EDR's the simple way, by not touching any of the API's they hook.☆68Updated 5 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 8 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆32Updated 9 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 4 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 5 months ago