Neo23x0 / tiny-shells
All kinds of tiny shells
☆59Updated last year
Related projects ⓘ
Alternatives and complementary repositories for tiny-shells
- Living Off Security Tools☆37Updated 2 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆122Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆71Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- DEFCON 31 slide deck and video link☆58Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- ☆76Updated 5 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- ☆34Updated 8 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆72Updated this week
- ☆23Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- Artifact monitoring that ensures fairplay☆66Updated last year
- ☆40Updated 2 months ago
- MS Graph Commands and Tools for Blue Teamers☆48Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆104Updated 3 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆25Updated 3 weeks ago
- A small utility to translate NTDS.dit files to SQLite format.☆62Updated last year
- C2 Automation using Linode☆78Updated 2 years ago
- Default Detections for EDR☆94Updated 8 months ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Leak NTLM via Website tab in teams via MS Office☆77Updated 7 months ago