a7t0fwa7 / Attacker_Infrastructure_SetupLinks
☆11Updated 3 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
Sorting:
- An offensive security framework for writing payloads☆17Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Cobalt Strike BOFS☆16Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated 2 weeks ago
- Some good things for EXP-301 course☆12Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆18Updated 7 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆12Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆12Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Slides and videos from talks given at cons☆23Updated 3 weeks ago
- ☆16Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆10Updated 8 months ago
- IAT Unhooking proof-of-concept☆30Updated last year
- wsnet☆26Updated last month