fortra / Reversing-and-Exploiting-with-Free-Tools-Series
Tips and tricks on reversing and exploiting Windows using free and easy to get tools.
☆25Updated 2 years ago
Alternatives and similar repositories for Reversing-and-Exploiting-with-Free-Tools-Series:
Users that are interested in Reversing-and-Exploiting-with-Free-Tools-Series are comparing it to the libraries listed below
- AMSI Bypass for powershell☆30Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
- ☆17Updated 5 months ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆52Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ADSI based SA tool☆17Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- ☆45Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- ☆35Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ☆24Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆51Updated 3 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- ☆17Updated 5 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- subTee gists code backups☆37Updated 7 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- ☆13Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆79Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago