alexcote1 / Sliverer
runs sliver command on all hosts, partially based on example in sliver repo
☆12Updated 9 months ago
Alternatives and similar repositories for Sliverer:
Users that are interested in Sliverer are comparing it to the libraries listed below
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- ☆83Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 7 months ago
- ☆52Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆16Updated 10 months ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- Bloodhound agent for Mythic☆16Updated 4 months ago
- Python module for running BOFs☆64Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆22Updated last month
- ☆48Updated 2 months ago
- Nemesis agent for Mythic☆26Updated 4 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 6 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆56Updated 10 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆20Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- malleable profile generator GUI for Havoc☆56Updated last year
- winacl, a cross platforms Go library to work with ntSecurityDescriptor.☆26Updated 2 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆16Updated last year
- ☆52Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆15Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆28Updated 4 months ago