emcghee / PayloadAutomation
☆117Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PayloadAutomation
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- ☆138Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆48Updated 5 months ago
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆123Updated 8 months ago
- ☆68Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆138Updated 8 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- Get Fine Grained Password Policy☆65Updated 6 months ago
- ☆54Updated 8 months ago
- Find .net assemblies locally☆92Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated last year
- ☆36Updated last month
- Exchangelib wrapper for pentesting☆56Updated 5 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- UI for creating LNKs☆96Updated 3 years ago
- ☆74Updated 7 months ago
- ☆89Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆118Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆173Updated 2 years ago