enigma0x3 / atomic-red-team
Small and highly portable detection tests.
☆12Updated 7 years ago
Alternatives and similar repositories for atomic-red-team:
Users that are interested in atomic-red-team are comparing it to the libraries listed below
- Mimikatz HashClash☆12Updated 9 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆17Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- ☆16Updated 9 years ago
- ☆19Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- ☆40Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆25Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Still in dev mode☆12Updated 7 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- ☆13Updated 3 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated 11 months ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Office365 Tenants List☆16Updated 6 years ago
- ☆13Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- ☆24Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆51Updated 6 years ago