ContandoBits / CRTO-Cheatsheet-MindmapLinks
A cheatsheet and mindmap for CRTO certification
☆10Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆21Updated 7 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆93Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆13Updated last year
- ☆15Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Erebus is a payload generator written in Nim.☆16Updated 2 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- ☆140Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- ☆18Updated last month
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 7 months ago