CroodSolutions / BypassITLinks
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆46Updated 7 months ago
Alternatives and similar repositories for BypassIT
Users that are interested in BypassIT are comparing it to the libraries listed below
Sorting:
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 6 months ago
- Payload Generation Workflow☆40Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- POC tool to abuse windows server failover clusters☆53Updated 6 months ago
- ☆42Updated 8 months ago
- ☆41Updated 2 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆30Updated this week
- Lifetime AMSI bypass.☆36Updated 9 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Updated 11 months ago
- Ludus range for the Constructing Defense Lab☆73Updated 2 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated 5 months ago
- ☆24Updated 11 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆44Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 10 months ago
- A python library to create BloodHound OpenGraphs☆48Updated 2 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Updated 10 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- ☆35Updated 2 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Updated last month
- ☆57Updated 8 months ago
- Your Skyfall Infrastructure Pack☆90Updated 2 weeks ago
- ☆52Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Updated 2 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Updated 7 months ago
- Living off the land searches for explorer and sharepoint☆92Updated 2 months ago