Tarakhs / ToyingWithHellsGateLinks
Brief writeup of post exploitation methodologies.
☆18Updated last year
Alternatives and similar repositories for ToyingWithHellsGate
Users that are interested in ToyingWithHellsGate are comparing it to the libraries listed below
Sorting:
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated 3 weeks ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Sniffing files generator☆59Updated 4 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆26Updated last month
- Utilities for obfuscating shellcode☆69Updated 4 months ago
- ☆56Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆114Updated 3 weeks ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆49Updated 4 months ago
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 7 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 6 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- ☆39Updated 4 months ago
- Client-side Encrypted Upload Server Python Script☆28Updated this week
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- ☆59Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆107Updated 4 months ago
- ☆46Updated 3 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Installing wazuh SIEM Unified XDR and SIEM protection☆29Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 3 months ago
- Mockingjay process self injection POC☆35Updated last year
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago