d3adzo / mesa
Command and Control that uses NTP as the transport protocol.
☆21Updated 3 years ago
Alternatives and similar repositories for mesa:
Users that are interested in mesa are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- ☆24Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆22Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- ☆10Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- ☆37Updated 11 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- Scripts to interact with Microsoft Graph APIs☆36Updated 5 months ago
- ☆37Updated 2 years ago