Hackcraft-Labs / BlueprintLinks
Templating with sinister modules
☆16Updated 2 years ago
Alternatives and similar repositories for Blueprint
Users that are interested in Blueprint are comparing it to the libraries listed below
Sorting:
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Updated 6 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated 9 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- ☆47Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 3 years ago
- Bunch of BOF files☆33Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆37Updated last month
- ☆19Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- Some of my custom "tools".☆28Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 4 months ago
- in-process powershell runner for BRC4☆46Updated last year
- Public repo of some woking evilginx phishlets☆37Updated 9 months ago
- ☆59Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆27Updated last year
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- ☆48Updated 2 years ago