FlatL1neAPT / Malware
☆19Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malware
- ☆39Updated 6 years ago
- ☆18Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆20Updated 7 years ago
- Executables that execute other stuff☆51Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- ☆43Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Generic malicious browser check written in C#☆12Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆46Updated 6 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 3 years ago
- A C# DLL to Dump LSA Secrets☆56Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- medium-rare☆27Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 4 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 6 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago