HarmJ0y / Malleable-C2-ProfilesView external linksLinks
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use.
☆18Feb 17, 2015Updated 10 years ago
Alternatives and similar repositories for Malleable-C2-Profiles
Users that are interested in Malleable-C2-Profiles are comparing it to the libraries listed below
Sorting:
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- ☆23Feb 16, 2016Updated 9 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- ☆22Mar 4, 2025Updated 11 months ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 9 years ago
- This is a GUI for the projet https://github.com/PowerShellEmpire/Empire☆16Jun 19, 2017Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- The Paper Artifact Availability☆20Aug 26, 2022Updated 3 years ago
- A Common Vulnerability PoC Knowledge Base一个普遍漏洞POC知识库☆24Jun 24, 2023Updated 2 years ago
- competition hackpack used by CU Cyber☆21Mar 9, 2022Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Passive DNS visualization and Passive DNS server toolkit☆35Mar 22, 2012Updated 13 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆250Apr 18, 2017Updated 8 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆144Oct 31, 2017Updated 8 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- scrapes Linkedin for company employee profiles☆57Mar 8, 2017Updated 8 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- ☆22May 25, 2017Updated 8 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago