foxlox / cthulhuLinks
AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID
☆19Updated 3 years ago
Alternatives and similar repositories for cthulhu
Users that are interested in cthulhu are comparing it to the libraries listed below
Sorting:
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆39Updated 4 years ago
- Citrix Phishlet☆24Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆18Updated 4 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆56Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated 2 weeks ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- Cobalt Strike Aggressor scripts☆9Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- ☆33Updated 5 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- ☆13Updated 6 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- ☆18Updated last month
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆63Updated 3 years ago
- c# reverse shell poc☆27Updated 6 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 3 years ago