breakid / terminal_syncLinks
A standalone tool for logging shell commands to GhostWriter automatically
☆17Updated 9 months ago
Alternatives and similar repositories for terminal_sync
Users that are interested in terminal_sync are comparing it to the libraries listed below
Sorting:
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- Simple reverse ICMP shell☆14Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- ☆25Updated 3 years ago
- ☆14Updated last year
- Nemesis agent for Mythic☆27Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆40Updated 7 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 6 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- terraform deployment for red team☆22Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 3 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆22Updated 3 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Examples of various container types for Python and Golang☆13Updated 2 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆42Updated 2 months ago
- ☆23Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆11Updated 7 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 3 months ago
- ☆25Updated 3 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- Payload Generation Framework☆9Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆23Updated 2 weeks ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆58Updated 3 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago