ashirt-ops / ashirtView external linksLinks
It records your screenshots and code, then lets you upload to ASHIRT
☆57Feb 8, 2026Updated last week
Alternatives and similar repositories for ashirt
Users that are interested in ashirt are comparing it to the libraries listed below
Sorting:
- It records your terminal, then lets you upload to ASHIRT☆29Feb 8, 2026Updated last week
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Feb 8, 2026Updated last week
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated last month
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆24Feb 1, 2025Updated last year
- Obfuscate UDP traffic as RTP☆22Sep 25, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆18Feb 29, 2024Updated last year
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- C# .NET Assembly for interacting with File Object DACLs☆46Apr 3, 2020Updated 5 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- A repo to support the book☆113Aug 5, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆111May 24, 2020Updated 5 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago