Tw1sm / badger-builder
badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles
☆54Updated 5 months ago
Alternatives and similar repositories for badger-builder
Users that are interested in badger-builder are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- ☆50Updated 6 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated 11 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- ☆71Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆36Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Lifetime AMSI bypass.☆35Updated 3 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆59Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- ☆27Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆66Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated 2 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- ☆17Updated 7 months ago
- ☆30Updated this week
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated last month
- ☆52Updated last year
- ☆44Updated 10 months ago
- Validates priv escalation of AD trusts☆39Updated last month
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last week
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year