SafeBreach-Labs / CloudMinerView external linksLinks
Execute code using Azure Automation service without getting charged
☆142Nov 8, 2023Updated 2 years ago
Alternatives and similar repositories for CloudMiner
Users that are interested in CloudMiner are comparing it to the libraries listed below
Sorting:
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆27Dec 23, 2025Updated last month
- Patching AmsiOpenSession by forcing an error branching☆155Aug 2, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆234Oct 8, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 8 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated last year
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Event Data Collector☆40Jan 12, 2026Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Feb 28, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Aug 8, 2022Updated 3 years ago