Cyb3rWard0g / docker-pupyLinks
Docker setup for Pupy
☆28Updated 2 years ago
Alternatives and similar repositories for docker-pupy
Users that are interested in docker-pupy are comparing it to the libraries listed below
Sorting:
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- ☆38Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Updated 6 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 3 years ago
- A Cobaltstrike container, built for Warhorse☆37Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- ☆66Updated 2 years ago
- ☆59Updated 4 years ago
- MSBuild without MSbuild.exe☆135Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Updated 4 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago
- ☆132Updated 4 years ago
- ☆71Updated 5 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆111Updated 5 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated last week
- A little tool to play with Kerberos.☆66Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆142Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 3 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Updated 5 years ago
- PowerView menu for Cobalt Strike☆69Updated 7 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆20Updated 5 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Updated 4 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago