Microsoft External Attack Tool
☆178Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Carnivore
Users that are interested in Carnivore are comparing it to the libraries listed below
Sorting:
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆627May 28, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆346Sep 1, 2021Updated 4 years ago
- ☆415Apr 28, 2021Updated 4 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆144Oct 31, 2017Updated 8 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆305Jun 14, 2024Updated last year
- A toolkit to attack Office365☆1,117Nov 6, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆235Feb 15, 2021Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆879Mar 29, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Jun 25, 2024Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆604Mar 2, 2021Updated 5 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆513Sep 23, 2020Updated 5 years ago