dmcxblue / PyObscura
A python script that automates a C2 Profile build
☆35Updated 2 weeks ago
Alternatives and similar repositories for PyObscura:
Users that are interested in PyObscura are comparing it to the libraries listed below
- ☆41Updated this week
- ☆54Updated last month
- ForsHops☆95Updated 3 weeks ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆17Updated last week
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- Impersonate Tokens using only NTAPI functions☆54Updated last week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆86Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆24Updated 2 months ago
- Adversary Emulation Framework☆96Updated 8 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆73Updated last month
- ☆106Updated last month
- TokenCert☆95Updated 5 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆81Updated last week
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆136Updated 2 months ago
- ☆96Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- Impacket pre-compiled binaries☆15Updated last year
- a port of privkit bof for havoc☆23Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated this week
- ☆54Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- ☆104Updated 3 weeks ago
- Cortex EDR Ransomware protection Bypass☆21Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated 11 months ago
- Sniffing files generator☆55Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- AzureAD beacon object files☆115Updated 3 months ago