ashirt-ops / atermView external linksLinks
It records your terminal, then lets you upload to ASHIRT
☆29Updated this week
Alternatives and similar repositories for aterm
Users that are interested in aterm are comparing it to the libraries listed below
Sorting:
- It records your screenshots and code, then lets you upload to ASHIRT☆57Updated this week
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated last month
- ☆15Jul 20, 2022Updated 3 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆21Sep 23, 2025Updated 4 months ago
- ☆39May 20, 2023Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆63Jan 7, 2025Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Your Skyfall Infrastructure Pack☆90Jan 25, 2026Updated 2 weeks ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 6 months ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- ☆21Jan 8, 2026Updated last month
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago