Telefonica / uac-a-molaLinks
☆106Updated 4 years ago
Alternatives and similar repositories for uac-a-mola
Users that are interested in uac-a-mola are comparing it to the libraries listed below
Sorting:
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- ☆59Updated 5 years ago
- ☆79Updated 8 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 6 years ago
- VBA Reversed TCP Meterpreter Stager☆63Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- ☆99Updated 6 years ago
- ☆102Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Responsive Command and Control System☆104Updated 2 years ago
- ☆44Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- ☆82Updated 5 years ago
- Bash Bunny fun!☆52Updated 7 years ago
- Windows RID Hijacking persistence technique☆175Updated 8 months ago
- How To Execute Shellcode via HTA☆140Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago