ParrotSec / shellterLinks
☆209Updated 5 years ago
Alternatives and similar repositories for shellter
Users that are interested in shellter are comparing it to the libraries listed below
Sorting:
- Bypass AMSI by patching AmsiScanBuffer☆267Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- XLL Phishing Tradecraft☆423Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆263Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆272Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆306Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆946Updated last year
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆410Updated 9 months ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆373Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆308Updated 10 months ago
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆273Updated 10 months ago
- Command and Control Framework written in C#☆412Updated last year
- Manipulating and Abusing Windows Access Tokens.☆278Updated 4 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆363Updated this week
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆417Updated last year
- BadAssMacros - C# based automated Malicous Macro Generator.☆422Updated 3 years ago
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆160Updated 3 weeks ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆555Updated 2 years ago
- PowerShell Script Obfuscator☆556Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆322Updated last year
- Windows reverse shell GUI☆101Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆267Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆302Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆260Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆515Updated 2 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆218Updated 3 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,245Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆976Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆868Updated 2 years ago
- ☆522Updated 3 years ago