foxlox / cthulhuLinks
AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID
☆20Updated 4 years ago
Alternatives and similar repositories for cthulhu
Users that are interested in cthulhu are comparing it to the libraries listed below
Sorting:
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 5 years ago
- Modified version of Pypykatz to print encrypted credentials☆54Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- C# tool to discover low hanging fruits☆96Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- ☆29Updated 3 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆23Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Updated 8 months ago
- Secretsdump C# version only supporting local (live) operation☆51Updated 7 months ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago