RWXstoned / GimmeShelter
Situational Awareness script to identify how and where to run implants
☆38Updated last month
Alternatives and similar repositories for GimmeShelter:
Users that are interested in GimmeShelter are comparing it to the libraries listed below
- ☆46Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Source code and examples for PassiveAggression☆54Updated 7 months ago
- ☆39Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Docker container for running CobaltStrike 4.10☆35Updated 3 months ago
- Our Tips&Tricks☆38Updated last month
- malleable profile generator GUI for Havoc☆56Updated last year
- in-process powershell runner for BRC4☆43Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆29Updated 4 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated 2 weeks ago
- A pure C version of SymProcAddress☆24Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Discord C2 Profile for Mythic☆26Updated 8 months ago
- ☆58Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 8 months ago
- A small red team course☆34Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆45Updated this week
- ☆43Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 5 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆68Updated last year
- A PoC for achieving persistence via push notifications on Windows☆45Updated last year
- ☆54Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- ☆48Updated 2 months ago