Telefonica / uac-a-mola
☆105Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for uac-a-mola
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- PowerShell Empire mod to post-exploit the World!☆135Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- Platform independent peCloak fork based on Capstone☆103Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- ☆102Updated 5 years ago
- How To Execute Shellcode via HTA☆136Updated 6 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- ☆59Updated 4 years ago
- A payload stager using PowerShell☆183Updated 4 years ago
- some pocs for antivirus evasion☆129Updated last year
- Port of eternal blue exploits to powershell☆149Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆135Updated 5 years ago
- Windows RID Hijacking persistence technique☆165Updated this week
- Pypykatz server☆124Updated 5 years ago
- Powershell Empire Persistence finder☆117Updated 7 years ago
- ☆92Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- MS17-010☆63Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago