Plazmaz / LNKUp
Generates malicious LNK file payloads for data exfiltration
☆377Updated 7 years ago
Alternatives and similar repositories for LNKUp:
Users that are interested in LNKUp are comparing it to the libraries listed below
- Malicious WMI Events using PowerShell☆381Updated 8 years ago
- NTLMv1 Multitool☆612Updated 3 weeks ago
- Chameleon: A tool for evading Proxy categorisation☆486Updated 4 months ago
- ☆518Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆516Updated 2 years ago
- This is a weaponized WSUS exploit☆283Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆341Updated 4 months ago
- Rapid Attack Infrastructure (RAI)☆303Updated 4 months ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆269Updated 8 months ago
- Search for potential frontable domains☆622Updated 2 years ago
- SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.☆666Updated 6 years ago
- getsystem via parent process using ps1 & embeded c#☆399Updated last year
- Aggressor scripts I've made for Cobalt Strike☆407Updated last year
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆836Updated 3 years ago
- A modular C2 framework☆448Updated 2 months ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆518Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,004Updated 5 years ago
- linikatz is a tool to attack AD on UNIX☆548Updated last year
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆403Updated last year
- Active Directory ACL exploitation with BloodHound☆718Updated 3 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆441Updated last year
- Aggressor scripts for use with Cobalt Strike 3.0+☆831Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆385Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆520Updated last year
- Embed and hide any file in an HTML file☆483Updated 7 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆573Updated 10 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆932Updated 7 years ago
- Windows batch script that finds misconfiguration issues which can lead to privilege escalation.☆593Updated 4 months ago
- socks4 reverse proxy for penetration testing☆588Updated 6 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆377Updated 5 years ago