a7t0fwa7 / Attacker_Infrastructure_Setup
☆9Updated this week
Alternatives and similar repositories for Attacker_Infrastructure_Setup:
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Tool for scanning domains for .git directories.☆13Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Cobalt Strike BOFS☆15Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆22Updated 8 months ago
- ☆18Updated 4 months ago
- ☆24Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- ☆12Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- ☆28Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Slides and videos from talks given at cons☆13Updated 9 months ago
- ☆21Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 5 months ago
- ☆11Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆34Updated 10 months ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- ☆27Updated last year
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 9 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆21Updated 3 years ago