MalPhobic / MalwareReports
☆11Updated 3 years ago
Related projects: ⓘ
- Reverse shell macro using Word VBA☆13Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Exploits made practicing for OSCE☆21Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Simple C2 over the Trello API☆37Updated last year
- ☆10Updated this week
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆13Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- My Malware Analysis Reports☆18Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- ☆23Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆19Updated last year
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆14Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆16Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆33Updated 10 months ago
- ☆16Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- powershell tool for VM evasion☆43Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago