LeighlinRamsay / Advanced-ASMI-BypassLinks
This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.
☆24Updated 6 months ago
Alternatives and similar repositories for Advanced-ASMI-Bypass
Users that are interested in Advanced-ASMI-Bypass are comparing it to the libraries listed below
Sorting:
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆165Updated 5 months ago
- ☆79Updated 7 months ago
- Everything and anything related to password spraying☆151Updated last year
- Sliver CheatSheet for OSEP☆220Updated 3 weeks ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆159Updated 2 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆138Updated 8 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- A cheatsheet for NetExec☆168Updated 6 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆189Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 8 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 8 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆69Updated 4 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆109Updated 6 months ago
- PowerShell Obfuscator☆223Updated 3 months ago
- ☆120Updated 6 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆306Updated 4 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆257Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- ☆103Updated 10 months ago
- Continuous password spraying tool☆198Updated 3 weeks ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆174Updated 6 months ago
- Decrypt Chromium based browser passwords with PowerShell.☆128Updated last month
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆256Updated last month
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆26Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆211Updated 5 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 5 months ago
- A list of all Active Directory machines from HackTheBox☆189Updated last month
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆350Updated 2 weeks ago
- ☆173Updated 8 months ago
- Detect common NFS server misconfigurations☆90Updated 6 months ago