MalPhobic / MalwareReports
☆11Updated 4 years ago
Alternatives and similar repositories for MalwareReports:
Users that are interested in MalwareReports are comparing it to the libraries listed below
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- AMSI detection PoC☆31Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆28Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆16Updated 3 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago