fashionproof / UglyEXe
UglyEXe - bypass some AVs
☆16Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for UglyEXe
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- ☆16Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- ☆37Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- treafik fronted c2 examples☆26Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago
- ☆16Updated 3 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 4 months ago
- ☆69Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 8 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- A tool to password spray Jenkins instances☆52Updated 5 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆77Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 4 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- Tests AD passwords while respecting Bad Password Count☆17Updated 5 years ago