Print3M / ByteCasterLinks
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
☆204Updated 3 months ago
Alternatives and similar repositories for ByteCaster
Users that are interested in ByteCaster are comparing it to the libraries listed below
Sorting:
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 5 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆118Updated last month
- ☆163Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 8 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆97Updated 3 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- ☆151Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆352Updated last week
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆173Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- ☆62Updated last week
- PoC that downloads an executable from a public SSL certificate☆136Updated 4 months ago
- ☆121Updated 6 months ago
- The different ways to dump lsass☆202Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated 11 months ago
- Enumerate active EDR's on the system☆146Updated 2 months ago
- Our Tips&Tricks☆127Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆79Updated 7 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated this week
- Permanently disable EDRs as local admin☆122Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 7 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 10 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆87Updated 5 months ago
- Vast.ai Password Kracking☆92Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆134Updated 4 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year