FuzzySecurity / BlueHatIL-2020Links
BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET
☆147Updated 5 years ago
Alternatives and similar repositories for BlueHatIL-2020
Users that are interested in BlueHatIL-2020 are comparing it to the libraries listed below
Sorting:
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆159Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆232Updated 2 years ago
- DLL Generator for side loading attack☆173Updated 6 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆106Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆260Updated 6 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- Abusing Exchange via EWS☆149Updated 4 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- An Insider Threat Toolkit☆152Updated 6 years ago
- Pypykatz agent implemented in .NET☆85Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- ☆83Updated 8 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 5 months ago
- A C# implementation of PrivExchange by @_dirkjan.☆156Updated 6 years ago
- Presentation material presented by Outflank team members at public events.☆190Updated 8 months ago
- ☆183Updated 3 years ago
- ☆94Updated 6 years ago
- How To Execute Shellcode via HTA☆141Updated 7 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 11 months ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆141Updated 4 years ago
- .NET tool for enumeration processes and dumping memory.☆57Updated 6 years ago
- ☆127Updated 5 years ago