Hubbl3 / ThreatCheckLinks
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
☆12Updated last year
Alternatives and similar repositories for ThreatCheck
Users that are interested in ThreatCheck are comparing it to the libraries listed below
Sorting:
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 8 months ago
- Extract registry and NTDS secrets from local or remote disk images☆44Updated 8 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆19Updated last year
- Discord C2 Profile for Mythic☆33Updated 9 months ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- ☆49Updated 2 years ago
- ☆29Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Find Inbound Email Domains☆35Updated last year
- rust port of pspy with support for process monitoring over dbus☆35Updated 5 months ago
- custom impacket mssqlclient☆26Updated 2 years ago
- ☆19Updated 11 months ago
- ☆26Updated 8 months ago
- ☆47Updated 2 years ago
- ☆38Updated 8 months ago
- ☆36Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Enumerate the Domain for Readable and Writable Shares☆23Updated 2 weeks ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 10 months ago