RiverGumSecurity / PythonShellcode
☆25Updated 2 years ago
Alternatives and similar repositories for PythonShellcode:
Users that are interested in PythonShellcode are comparing it to the libraries listed below
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- pysnaffler☆91Updated last month
- Living Off the Foreign Land setup scripts☆67Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆152Updated last year
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- ☆71Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- Collection of tools to use with Azure Applications☆108Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆38Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- Malware As A Service☆132Updated last year
- ☆12Updated 2 weeks ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆55Updated 2 months ago
- ☆137Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- ☆159Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆138Updated 8 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- ☆117Updated 3 weeks ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 3 weeks ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Updated last year