SygniaLabs / pwndropView external linksLinks
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
☆38Feb 4, 2025Updated last year
Alternatives and similar repositories for pwndrop
Users that are interested in pwndrop are comparing it to the libraries listed below
Sorting:
- coremail address list export☆12Sep 9, 2021Updated 4 years ago
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- ☆56Aug 19, 2024Updated last year
- ☆39Sep 25, 2023Updated 2 years ago
- A self-hosted Armory implementation.☆21Jan 1, 2026Updated last month
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆131Nov 10, 2023Updated 2 years ago
- ☆46Dec 5, 2023Updated 2 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- ☆27May 14, 2022Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- stealth userland kit that doesn't use sys_clone/sys_execve call☆34Apr 10, 2025Updated 10 months ago
- ☆28Oct 11, 2025Updated 4 months ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆265Sep 26, 2025Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆38Dec 7, 2025Updated 2 months ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Jun 15, 2024Updated last year
- ☆124May 12, 2021Updated 4 years ago
- ☆126Sep 1, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆49Nov 7, 2022Updated 3 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 10 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆42Apr 14, 2024Updated last year
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆419Apr 6, 2023Updated 2 years ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated 11 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Abuse leaked token handles.☆134Dec 14, 2023Updated 2 years ago
- Fast IP Changer for any Huawei 3G/4G modems☆11Feb 19, 2020Updated 5 years ago