FlatL1neAPT / Red-Team-softLinks
☆18Updated 7 years ago
Alternatives and similar repositories for Red-Team-soft
Users that are interested in Red-Team-soft are comparing it to the libraries listed below
Sorting:
- ☆39Updated 7 years ago
- ☆18Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Aggressor scripts for Cobalt Strike☆57Updated 5 years ago
- Domain fronting using Google app engine☆52Updated 7 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- ☆31Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Template for asynchronously controlling meterpreter sessions☆12Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- ☆50Updated 4 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 4 years ago
- ☆29Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- eternalrelayx☆37Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago