Telefonica / uac-a-mola
☆103Updated 3 years ago
Alternatives and similar repositories for uac-a-mola:
Users that are interested in uac-a-mola are comparing it to the libraries listed below
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- PowerShell Empire mod to post-exploit the World!☆135Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆148Updated 6 years ago
- Platform independent peCloak fork based on Capstone☆104Updated 8 years ago
- MS17-010☆63Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- ☆59Updated 4 years ago
- Windows RID Hijacking persistence technique☆172Updated 3 months ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆160Updated last year
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133Updated 5 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- ☆102Updated 5 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 6 years ago
- An automated SMB relay exploitation script.☆152Updated 8 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- A payload stager using PowerShell☆183Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- OFFICE DDEAUTO Payload Generation script☆127Updated 4 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- How To Execute Shellcode via HTA☆137Updated 6 years ago
- Teaching old shellcode new tricks☆204Updated 7 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago