JoelGMSec / Invoke-Transfer
PowerShell Clipboard Data Transfer
☆67Updated last month
Related projects: ⓘ
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆105Updated 2 years ago
- My Favorite Offensive Security Scripts☆57Updated last year
- ☆46Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆60Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆60Updated last year
- ☆138Updated this week
- PowerShell Reverse Shell☆60Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- C# havoc implant☆90Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆80Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆74Updated 10 months ago
- ACL abuse swiss-knife☆116Updated last year
- Windows Privilege Escalation☆41Updated 2 years ago
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆72Updated 3 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 9 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆75Updated last week
- ☆24Updated last year
- ☆110Updated last year
- Lateral Movement☆117Updated 10 months ago
- ☆53Updated 5 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago