MythicAgents / scarecrow_wrapper
☆16Updated 5 months ago
Alternatives and similar repositories for scarecrow_wrapper:
Users that are interested in scarecrow_wrapper are comparing it to the libraries listed below
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆57Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- ☆36Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ☆15Updated last year
- Bunch of BOF files☆30Updated 3 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated last week
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆37Updated last week
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- ☆24Updated 3 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆62Updated 2 months ago
- ☆48Updated last year
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago