byt3bl33d3r / AnsiblePlaybooksView external linksLinks
A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
☆164Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for AnsiblePlaybooks
Users that are interested in AnsiblePlaybooks are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Aggressor scripts for Cobalt Strike☆61Dec 9, 2019Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆123Jul 7, 2023Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- ☆69Dec 19, 2018Updated 7 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆760Sep 23, 2024Updated last year
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Tool to create hidden registry keys.☆491Oct 23, 2019Updated 6 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Jan 21, 2022Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Parse PowerShell and Security event logs for sensitive information.☆128Mar 29, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 6 years ago
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- A toolkit to attack Office365☆1,115Nov 6, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Search for potential frontable domains☆642Mar 22, 2023Updated 2 years ago