CroodSolutions / BypassIT
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆35Updated 3 months ago
Alternatives and similar repositories for BypassIT:
Users that are interested in BypassIT are comparing it to the libraries listed below
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- ☆23Updated 2 months ago
- ☆37Updated 2 months ago
- Lifetime AMSI bypass.☆34Updated 2 weeks ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- A C# project that builds a Web Application which redirects all HTTPS☆25Updated 3 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆40Updated 3 weeks ago
- SMB Audit Tool you were looking for☆21Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆21Updated 3 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆45Updated last month
- Bloodhound agent for Mythic☆18Updated 3 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago
- C# port of the AMSI bypass technique originally developed and documented by Andrea Bocchetti☆24Updated last week
- ☆40Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 3 months ago
- ☆14Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 5 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 2 months ago
- Linux CS bypass technique☆33Updated 3 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆33Updated 3 weeks ago
- Enumerate the Domain for Readable and Writable Shares☆18Updated 2 months ago
- Your Skyfall Infrastructure Pack☆68Updated last week
- A python script that automates a C2 Profile build☆40Updated last month
- ☆17Updated 7 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆19Updated this week
- ☆50Updated 6 months ago