Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.
☆19Jun 12, 2022Updated 3 years ago
Alternatives and similar repositories for collector
Users that are interested in collector are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- ☆99Sep 20, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆95Oct 19, 2022Updated 3 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 2 months ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆11Jul 11, 2023Updated 2 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- Tool for playing with Windows Access Token manipulation.☆82Nov 28, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆78Oct 18, 2022Updated 3 years ago