FuzzySecurity / BH-Arsenal-2019Links
SilkETW & SilkService
☆40Updated 6 years ago
Alternatives and similar repositories for BH-Arsenal-2019
Users that are interested in BH-Arsenal-2019 are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 8 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Updated 11 months ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Updated last year
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- ☆41Updated 7 years ago
- ☆41Updated 7 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 6 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 8 years ago
- ☆33Updated 3 years ago
- ☆19Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- Useful Threat Hunting Stuff☆32Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- ☆110Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Random source codes☆26Updated 3 weeks ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 9 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …