ContandoBits / CRTO-Cheatsheet-MindmapLinks
A cheatsheet and mindmap for CRTO certification
☆13Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated last year
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 10 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆15Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Discord C2 Profile for Mythic☆32Updated 8 months ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 6 years ago
- ☆16Updated last year
- ☆38Updated 3 years ago
- Notification webhook for GoPhish☆55Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆38Updated 3 years ago
- ☆13Updated 9 months ago