CroodSolutions / BypassITLinks
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆41Updated last month
Alternatives and similar repositories for BypassIT
Users that are interested in BypassIT are comparing it to the libraries listed below
Sorting:
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆83Updated 3 weeks ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆84Updated last week
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Lifetime AMSI bypass.☆35Updated 4 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 5 months ago
- Payload Generation Workflow☆40Updated last month
- ☆24Updated 6 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 5 months ago
- ☆40Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆51Updated 5 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- Windows Administrator level Implant.☆50Updated 11 months ago
- ☆33Updated 2 months ago
- ☆35Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- ☆64Updated 2 weeks ago
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆117Updated 3 weeks ago
- ☆52Updated 2 months ago
- Permanently disable EDRs as local admin☆94Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 9 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 8 months ago
- Situational Awareness script to identify how and where to run implants☆61Updated 8 months ago
- A user enumeration tool for Slack.☆30Updated last year
- rust port of pspy with support for process monitoring over dbus☆34Updated 2 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 9 months ago
- ☆50Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆69Updated last month
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆45Updated last month