CyberSecurityUP / Trevorfuscation
A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Trevorfuscation
- New Framework Red Team Operations☆17Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Noob Penetration tester☆10Updated 6 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆16Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- C2Matrix Automation☆12Updated last year
- ☆18Updated 3 years ago
- ☆15Updated 8 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- ☆20Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- ☆15Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆11Updated 4 years ago
- ☆13Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- ☆16Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- WMI SA stuffs☆29Updated 2 years ago