RiverGumSecurity / PythonShellcode
☆25Updated 2 years ago
Alternatives and similar repositories for PythonShellcode
Users that are interested in PythonShellcode are comparing it to the libraries listed below
Sorting:
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 3 months ago
- pysnaffler☆95Updated 2 months ago
- ☆13Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Efflanrs - GUI for Snaffler Output☆26Updated 8 months ago
- ☆71Updated last year
- A Python POC for CRED1 over SOCKS5☆149Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 10 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆93Updated 2 years ago
- ☆57Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- Custom queries list for BloodHound☆28Updated 8 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- ☆1Updated last year
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆42Updated last month
- Malware As A Service☆132Updated last year
- ☆55Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- ☆88Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆117Updated last year
- Living Off the Foreign Land setup scripts☆68Updated 2 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆33Updated last year