aahmad097 / ZoomPersistenceLinks
Zoom Persistence Aggressor and Handler
☆55Updated 4 years ago
Alternatives and similar repositories for ZoomPersistence
Users that are interested in ZoomPersistence are comparing it to the libraries listed below
Sorting:
- ☆53Updated 5 years ago
- ☆39Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Service Enumeration C# .NET Assembly☆59Updated 4 years ago
- ☆33Updated 5 years ago
- ☆53Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- C# port of LogServiceCrash☆46Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- ☆48Updated 5 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- D/Invoke port of UrbanBishop☆30Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 3 years ago
- Get or remove RunMRU values☆59Updated 6 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Updated 5 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41Updated 6 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Updated 2 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- Exchangelib wrapper for pentesting☆67Updated 10 months ago
- treafik fronted c2 examples☆25Updated 5 years ago
- ☆55Updated 4 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 4 years ago