MalwareSupportGroup / PolyDropLinks
A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit
☆105Updated last year
Alternatives and similar repositories for PolyDrop
Users that are interested in PolyDrop are comparing it to the libraries listed below
Sorting:
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆116Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆125Updated 7 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 7 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆82Updated 5 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆156Updated 10 months ago
- Addon for BHCE☆53Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- ☆114Updated 4 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆135Updated 9 months ago
- ☆141Updated 3 weeks ago
- Fast context enumeration for newly obtained Active Directory credentials.☆83Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 4 months ago
- ☆105Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆149Updated 2 months ago
- Vast.ai Password Kracking☆87Updated 4 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆260Updated 5 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- A community-driven collection of BloodHound queries☆152Updated 2 weeks ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 2 weeks ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year