a7t0fwa7 / Attacker_Infrastructure_Setup
☆9Updated 10 months ago
Related projects: ⓘ
- An offensive security framework for writing payloads☆13Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- Simple Shellcode Runner in Rust Language☆17Updated 9 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆17Updated last month
- Cobalt Strike BOFS☆16Updated 9 months ago
- PowerShell script to generate ShellCode in various formats☆22Updated 2 weeks ago
- Tool for scanning domains for .git directories.☆13Updated 11 months ago
- RegStrike is a .reg payload generator☆55Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB)☆34Updated 2 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 7 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆11Updated 10 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last month
- Monitor your target continuously for new subdomains!☆26Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆26Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆20Updated 2 years ago
- ☆26Updated this week
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆32Updated last year
- ☆12Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Parent Process ID Spoofing, coded in CGo.☆21Updated 2 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆18Updated 5 months ago
- A small red team course☆32Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated 2 months ago
- Enumeration & fingerprint tool☆23Updated 6 months ago
- ☆21Updated last year
- IAT Unhooking proof-of-concept☆26Updated 5 months ago
- ☆23Updated last year