ContandoBits / CRTO-Cheatsheet-MindmapLinks
A cheatsheet and mindmap for CRTO certification
☆13Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆20Updated 3 years ago
- this is a simple shell that has the ability to bypass defenses☆13Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆37Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 6 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆21Updated 7 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- Erebus is a payload generator written in Nim.☆16Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆21Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- ☆12Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26Updated 4 years ago
- Discord C2 Profile for Mythic☆33Updated 8 months ago