Print3M / ByteCasterLinks
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
☆180Updated last month
Alternatives and similar repositories for ByteCaster
Users that are interested in ByteCaster are comparing it to the libraries listed below
Sorting:
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆291Updated last week
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆169Updated 5 months ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- ☆164Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- Vast.ai Password Kracking☆88Updated 2 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated 2 months ago
- ☆61Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆131Updated 3 months ago
- Enumerate active EDR's on the system☆141Updated last month
- ☆144Updated last month
- ☆72Updated 9 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆149Updated 3 months ago
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- The different ways to dump lsass☆195Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- Execute shellcode via ASPNET compiler☆58Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- C2 writen in Rust & Go powered by Tor network.☆146Updated last week
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆127Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆118Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆264Updated 3 weeks ago
- Remote DLL Injection with Timer-based Shellcode Execution☆149Updated 3 months ago
- ☆116Updated 5 months ago
- ☆77Updated 6 months ago