audibleblink / sudophisher
A logging ASKPASS binary
☆29Updated 4 years ago
Alternatives and similar repositories for sudophisher:
Users that are interested in sudophisher are comparing it to the libraries listed below
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 2 years ago
- DNS server for pentesters☆49Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- ☆15Updated 2 years ago
- ☆24Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- ☆45Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 3 years ago
- Network Finger Printer☆16Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago