Inf0secRabbit / BadAssMacrosLinks
BadAssMacros - C# based automated Malicous Macro Generator.
☆437Updated 4 years ago
Alternatives and similar repositories for BadAssMacros
Users that are interested in BadAssMacros are comparing it to the libraries listed below
Sorting:
- ☆538Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆829Updated 2 years ago
- Collection of remote authentication triggers in C#☆524Updated last year
- ☆477Updated 3 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆438Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆421Updated 3 years ago
- XLL Phishing Tradecraft☆431Updated 3 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Updated 2 years ago
- Bypass AMSI by patching AmsiScanBuffer☆278Updated 4 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆767Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆737Updated 2 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆389Updated 2 years ago
- TCP Port Redirection Utility☆758Updated 3 years ago
- ☆821Updated 3 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆462Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆252Updated 2 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆570Updated 2 years ago
- ☆362Updated 4 years ago
- Various Cobalt Strike BOFs☆731Updated 3 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆431Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆776Updated 3 months ago
- Bypass for PowerShell Constrained Language Mode☆403Updated 4 years ago
- A .NET Framework 4.0 Windows Agent☆525Updated this week
- Framework for Kerberos relaying☆939Updated 3 years ago
- ☆413Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆605Updated 5 months ago
- PIC lsass dumper using cloned handles☆594Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆460Updated last year
- Collection of C# projects. Useful for pentesting and redteaming.☆322Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆383Updated 2 years ago