CultCornholio / solenyaView external linksLinks
Microsoft365 Device Code Phishing Framework
☆39Sep 4, 2021Updated 4 years ago
Alternatives and similar repositories for solenya
Users that are interested in solenya are comparing it to the libraries listed below
Sorting:
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated last month
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- ☆156Dec 14, 2023Updated 2 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- A proof of concept email spoofing tool built on Docker.☆129Aug 17, 2021Updated 4 years ago
- ☆31Jul 26, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago