HernanRodriguez1 / RevershellTCPEncrypt_BypassAMSILinks
☆13Updated 3 years ago
Alternatives and similar repositories for RevershellTCPEncrypt_BypassAMSI
Users that are interested in RevershellTCPEncrypt_BypassAMSI are comparing it to the libraries listed below
Sorting:
- ☆12Updated 3 years ago
- ☆25Updated last year
- ☆47Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- ☆98Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 11 months ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- ☆50Updated 5 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- ☆65Updated 2 years ago
- List of Command&Control (C2) software☆47Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Updated last year
- a map for the azure oriented pentests☆70Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- A collection of red blue team staff☆48Updated 2 years ago
- ☆90Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆50Updated this week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆135Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- ☆11Updated 2 years ago
- ☆22Updated last year
- ☆29Updated 4 years ago