A Red Team tool for exfiltrating sensitive data from Jira tickets.
☆86Feb 21, 2023Updated 3 years ago
Alternatives and similar repositories for Jir-Thief
Users that are interested in Jir-Thief are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Password Hunter in Active Directory☆199Jan 6, 2023Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 6 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆80Mar 13, 2026Updated 2 weeks ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Cobalt Strike Beacon Object Files☆167May 2, 2022Updated 3 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- ☆133Dec 19, 2020Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆149Nov 3, 2021Updated 4 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago