dreadnode / marque
Minimal workflows
☆15Updated 9 months ago
Alternatives and similar repositories for marque:
Users that are interested in marque are comparing it to the libraries listed below
- Nemesis agent for Mythic☆26Updated 4 months ago
- ☆16Updated 9 months ago
- HTML Smuggling with Web Assembly☆55Updated 10 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆15Updated 4 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆56Updated 10 months ago
- ☆15Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆20Updated last year
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 7 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 3 weeks ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- winacl, a cross platforms Go library to work with ntSecurityDescriptor.☆26Updated 2 months ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 7 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆13Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆18Updated 3 years ago
- a tiny program to consume from ETW providers for research☆45Updated 2 weeks ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated 10 months ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- Simple reverse ICMP shell☆13Updated 8 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆24Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated 10 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 10 months ago