CroodSolutions / BypassITLinks
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆39Updated last week
Alternatives and similar repositories for BypassIT
Users that are interested in BypassIT are comparing it to the libraries listed below
Sorting:
- Payload Generation Workflow☆38Updated 3 weeks ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 4 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆41Updated 5 months ago
- ☆40Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 11 months ago
- Windows Administrator level Implant.☆49Updated 9 months ago
- EvilGinx Modify / Custom PHISHLETs / JS☆40Updated this week
- ☆26Updated 4 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆30Updated last week
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆62Updated last year
- ☆24Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- ☆39Updated 4 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆43Updated 2 weeks ago
- ☆14Updated last year
- ☆50Updated 8 months ago
- SMB Audit Tool you were looking for☆21Updated 2 years ago
- ☆32Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- ☆17Updated 9 months ago
- ☆38Updated last month
- Enumerate the Domain for Readable and Writable Shares☆20Updated 4 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 4 months ago
- Client-side Encrypted Upload Server Python Script☆28Updated this week
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆27Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago