Print3M / ByteCasterLinks
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
☆196Updated 2 months ago
Alternatives and similar repositories for ByteCaster
Users that are interested in ByteCaster are comparing it to the libraries listed below
Sorting:
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 5 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆309Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- The different ways to dump lsass☆196Updated 3 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆170Updated 6 months ago
- ☆163Updated last week
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆97Updated 3 months ago
- PoC that downloads an executable from a public SSL certificate☆134Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- ☆62Updated last year
- Vast.ai Password Kracking☆89Updated last month
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆248Updated 6 months ago
- ☆144Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- Execute shellcode via ASPNET compiler☆58Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆179Updated 6 months ago
- Our Tips&Tricks☆127Updated 9 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆111Updated last week
- ☆120Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- Enumerate active EDR's on the system☆146Updated 2 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆86Updated 4 months ago
- ☆79Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated 3 weeks ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆129Updated 8 months ago
- Permanently disable EDRs as local admin☆121Updated last month