HernanRodriguez1 / RevershellTCP_BypassAMSILinks
☆12Updated 3 years ago
Alternatives and similar repositories for RevershellTCP_BypassAMSI
Users that are interested in RevershellTCP_BypassAMSI are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 years ago
- Some good things for EXP-301 course☆12Updated last year
- Cobalt Strike BOFS☆16Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- ☆15Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆19Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- Check the Domain for Local Admin Access☆15Updated 3 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- ☆27Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆12Updated 2 years ago
- Template Nuclei SSTI☆29Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆52Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆25Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated last month
- MacroExploit use in excel sheet☆20Updated last year