MythicC2Profiles / smbLinks
P2P Communications of Named Pipes
☆12Updated last week
Alternatives and similar repositories for smb
Users that are interested in smb are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- A Pentesters Confluence Keyword Scanner☆14Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆40Updated 3 weeks ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Updated last month
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- Your Skyfall Infrastructure Pack☆88Updated last month
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated 2 weeks ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 8 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Linux CS bypass technique☆32Updated 10 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆36Updated last week
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Updated 9 months ago
- Nemesis agent for Mythic☆28Updated last week
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆47Updated 10 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆83Updated this week
- ☆26Updated 9 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 9 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Updated 3 years ago
- ☆42Updated 6 months ago
- Find Inbound Email Domains☆35Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 9 months ago