Telefonica / uac-a-molaLinks
☆105Updated 4 years ago
Alternatives and similar repositories for uac-a-mola
Users that are interested in uac-a-mola are comparing it to the libraries listed below
Sorting:
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆162Updated 2 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- PowerShell Empire mod to post-exploit the World!☆138Updated 6 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆214Updated 6 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆197Updated 7 years ago
- Pypykatz server☆125Updated 6 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- ☆102Updated 5 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Port of eternal blue exploits to powershell☆149Updated 8 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- ☆59Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- MS17-010☆63Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- ☆94Updated 6 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago