SpiderLabs / pingback
☆25Updated 3 years ago
Alternatives and similar repositories for pingback:
Users that are interested in pingback are comparing it to the libraries listed below
- Repository for LNK stuff☆29Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A collection of my presentation materials.☆16Updated 10 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆11Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆17Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆12Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆37Updated 10 months ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆26Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago