Cyb3rWard0g / docker-pupy
Docker setup for Pupy
☆27Updated last year
Alternatives and similar repositories for docker-pupy:
Users that are interested in docker-pupy are comparing it to the libraries listed below
- ☆38Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 2 months ago
- ☆51Updated 2 years ago
- ☆35Updated 4 years ago
- AutoStart teamserver and listeners with services☆72Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆89Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- ☆56Updated 4 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- ☆67Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆50Updated 2 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 6 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 4 years ago
- ☆66Updated 3 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 4 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆73Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year