Hacker-Hermanos / CipherRun
CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.
☆12Updated last year
Alternatives and similar repositories for CipherRun:
Users that are interested in CipherRun are comparing it to the libraries listed below
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 9 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆13Updated last month
- ☆15Updated last year
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 5 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Automatically deploy Nemesis☆20Updated 8 months ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 7 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Excel Add In Payload Generator☆10Updated last year
- Discord C2 Profile for Mythic☆26Updated this week
- ☆11Updated 2 months ago
- My BloodHound custom queries☆23Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated 9 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- ☆25Updated last year
- Phishing Framework for OTP codes☆18Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 5 months ago