SafeBreach-Labs / SimpleBITSServer
A simple python implementation of a BITS server.
☆104Updated 3 years ago
Alternatives and similar repositories for SimpleBITSServer:
Users that are interested in SimpleBITSServer are comparing it to the libraries listed below
- Neutering Sysmon via driver unload☆227Updated 2 years ago
- ☆207Updated 3 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆122Updated last year
- Presentation material presented by Outflank team members at public events.☆185Updated 3 months ago
- InsecurePowerShell is PowerShell with some security features removed.☆102Updated 7 years ago
- Python based BloodHound data importer☆146Updated last year
- Documentation and supporting script sample for Windows Exploit Guard☆156Updated 3 years ago
- ☆127Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆261Updated 3 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆166Updated 5 years ago
- Code Exec via Excel☆86Updated 7 years ago
- ☆108Updated 3 years ago
- ☆60Updated 5 years ago
- A collection of tools to interact with Microsoft Security Response Center API☆97Updated last year
- Tools for discovery and abuse of COM hijacks☆303Updated 5 years ago
- ☆92Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆108Updated 6 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- (kinda) Malicious Outlook Reader☆134Updated 4 years ago
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- AdHoc solutions☆48Updated last year
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- Fraktal's Ransomware Emulator☆102Updated 11 months ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Updated 5 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆136Updated 5 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆184Updated 3 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- Scripts for performing and detecting parent PID spoofing☆144Updated 4 years ago
- ☆78Updated 8 years ago