Hackplayers / Salsa-tools
Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched
☆580Updated 5 years ago
Alternatives and similar repositories for Salsa-tools:
Users that are interested in Salsa-tools are comparing it to the libraries listed below
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆794Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆935Updated 7 years ago
- Process Injection☆761Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆507Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆522Updated 2 years ago
- C# Script used for Red Team☆719Updated 3 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆533Updated 3 years ago
- Malicious Macro Generator☆828Updated 6 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,256Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆763Updated 4 years ago
- Tricks for penetration testing☆578Updated 4 years ago
- Embed and hide any file in an HTML file☆485Updated 7 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆523Updated 3 years ago
- SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.☆664Updated 6 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆520Updated 6 years ago
- eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)☆466Updated last year
- Some useful scripts for CobaltStrike☆845Updated 4 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆839Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,484Updated last year
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆444Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,079Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,127Updated 4 years ago
- HTA encryption tool for RedTeams☆1,389Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,011Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated 7 months ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 5 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆245Updated 8 years ago