MRGEffitas / hwfwbypass
☆87Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for hwfwbypass
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- ☆84Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- ☆53Updated 7 years ago
- ☆58Updated 7 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- ☆93Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- A C# implementation of the PowerShell Empire Agent☆72Updated 5 years ago
- ☆49Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆90Updated 8 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 3 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago
- Encode powershell payload into bat files☆146Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- ☆27Updated 8 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆111Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- ☆34Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago