dreadnode / marque
Minimal workflows
☆19Updated last year
Alternatives and similar repositories for marque:
Users that are interested in marque are comparing it to the libraries listed below
- ☆16Updated last year
- Nemesis agent for Mythic☆27Updated 7 months ago
- HTML Smuggling with Web Assembly☆59Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆60Updated last year
- Bloodhound agent for Mythic☆17Updated this week
- Remote code execution in Power Platform connectors via JSON deserialization☆21Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 10 months ago
- Claude MCP server to perform analysis on ROADrecon data☆30Updated 3 weeks ago
- ☆15Updated last year
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 11 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 10 months ago
- Machine learning enabled dropper☆26Updated last year
- SMB Audit Tool you were looking for☆21Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆11Updated 5 months ago
- macOS dylib stager☆32Updated 2 months ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆16Updated 7 months ago
- ☆50Updated 5 months ago
- Smuggle a file to a user's browser☆19Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Simple reverse ICMP shell☆13Updated 11 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆23Updated this week
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Strategy for building a Red Team☆17Updated last year