ashirt-ops / ashirt-deploymentsView external linksLinks
Deployment code for ashirt-server
☆20Oct 15, 2025Updated 4 months ago
Alternatives and similar repositories for ashirt-deployments
Users that are interested in ashirt-deployments are comparing it to the libraries listed below
Sorting:
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Feb 8, 2026Updated last week
- ☆19Aug 26, 2020Updated 5 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Updated this week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- NFS client written in Go☆103Apr 12, 2023Updated 2 years ago
- FireProx written in Go☆21Apr 13, 2024Updated last year
- android-inject-hook☆15Feb 8, 2018Updated 8 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆10Dec 4, 2020Updated 5 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Jun 21, 2018Updated 7 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- E4's C2 server☆21Oct 12, 2020Updated 5 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Check if IP address is part of AWS infrastructure☆18Dec 2, 2020Updated 5 years ago
- Source for tasks I have used with Covenant☆122Mar 21, 2021Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated 11 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- A Python Typer-based CLI tool to check IP addresses against Azure services. It also uses Rich for some dope console output. Additionally,…☆21Mar 6, 2023Updated 2 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago