ContandoBits / CRTO-Cheatsheet-MindmapLinks
A cheatsheet and mindmap for CRTO certification
☆9Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆14Updated last year
- ☆12Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆47Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- ☆15Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 5 years ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 7 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated last month
- ☆16Updated 3 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- ☆12Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆12Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 4 months ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆18Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago