bobbyrsec / Microsoft-Teams-GIFShell
☆224Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Microsoft-Teams-GIFShell
- Microsoft Signed PowerShell scripts☆212Updated last year
- Roast in the Middle☆268Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆307Updated 3 weeks ago
- DPAPI looting remotely and locally in Python☆423Updated 2 weeks ago
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆374Updated last month
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆862Updated 5 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆300Updated 3 months ago
- ☆279Updated 3 weeks ago
- ☆400Updated 11 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆377Updated 7 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆372Updated last year
- Maximizing BloodHound. Max is a good boy.☆502Updated 3 months ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆394Updated 9 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆426Updated last week
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆321Updated 5 months ago
- ☆201Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆268Updated 3 weeks ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆301Updated 8 months ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆230Updated 9 months ago
- a tool to help operate in EDRs' blind spots☆654Updated 7 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆480Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆523Updated last year
- Shellcode launcher for AV bypass☆215Updated 10 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆452Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆254Updated last year