CyberSecurityUP / Trevorfuscation
A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool
☆15Updated last year
Alternatives and similar repositories for Trevorfuscation:
Users that are interested in Trevorfuscation are comparing it to the libraries listed below
- New Framework Red Team Operations☆17Updated 3 years ago
- C2Matrix Automation☆12Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Noob Penetration tester☆11Updated 10 months ago
- ☆17Updated 4 years ago
- Some good things for EXP-301 course☆11Updated last year
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆19Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- ☆24Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- ☆12Updated 2 years ago
- ☆29Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆19Updated last year
- ☆10Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- ☆16Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆15Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago