GhostPack / Invoke-Evasion
PowerShell Obfuscation and Data Science
☆173Updated 2 years ago
Alternatives and similar repositories for Invoke-Evasion:
Users that are interested in Invoke-Evasion are comparing it to the libraries listed below
- OPSEC safe Kerberoasting in C#☆189Updated 2 years ago
- ☆164Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆166Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ☆144Updated last week
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- Koppeling x Metatwin x LazySign☆206Updated 3 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆120Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆294Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆321Updated 11 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆139Updated 9 months ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- ☆120Updated last year
- Bypassing AppLocker with C#☆138Updated 3 years ago
- SpecterOps Presentations☆185Updated 3 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆186Updated 3 years ago
- Fully modular persistence framework☆250Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆229Updated last year
- ☆132Updated 7 months ago
- ☆135Updated last year
- ☆96Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆132Updated 6 months ago