HernanRodriguez1 / RevershellTCPEncrypt_BypassAMSILinks
☆13Updated 3 years ago
Alternatives and similar repositories for RevershellTCPEncrypt_BypassAMSI
Users that are interested in RevershellTCPEncrypt_BypassAMSI are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- ☆12Updated 3 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 weeks ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 9 months ago
- OSCP Study Guide☆41Updated 3 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- ☆15Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- ☆38Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Script related in Active Directory Attacks Domain☆23Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 2 weeks ago
- ☆12Updated 3 years ago
- a map for the azure oriented pentests☆68Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- A collection of red blue team staff☆47Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated last year
- ☆91Updated 2 years ago