An epic web shell
☆83Jun 10, 2025Updated 8 months ago
Alternatives and similar repositories for epic_shell
Users that are interested in epic_shell are comparing it to the libraries listed below
Sorting:
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Simple reverse shell over Slack☆57Apr 18, 2021Updated 4 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Jul 10, 2020Updated 5 years ago
- This repository is a collection of my malicious VBA projects.☆119Feb 13, 2021Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- internet monitoring osint telegram bot for windows☆154Apr 9, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- ☆351Feb 21, 2022Updated 4 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago