RenderZ0n3 / Malware-Development
☆10Updated last year
Alternatives and similar repositories for Malware-Development:
Users that are interested in Malware-Development are comparing it to the libraries listed below
- Scripts to interact with Microsoft Graph APIs☆32Updated 2 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆22Updated last month
- ☆14Updated 8 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆13Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated 3 weeks ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A simple to use single-include Windows API resolver☆19Updated 6 months ago
- ☆24Updated 3 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 7 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- ☆29Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- ☆12Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- ☆23Updated 8 months ago
- ☆47Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆31Updated last week
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 4 months ago
- ☆46Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago