fozavci / petaqc2
Petaq - Purple Team Command & Control Server
☆104Updated 2 years ago
Alternatives and similar repositories for petaqc2:
Users that are interested in petaqc2 are comparing it to the libraries listed below
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆99Updated 2 years ago
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- ☆162Updated 2 years ago
- ☆94Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 2 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- MSBuild Without MSBuild.exe☆156Updated 4 years ago
- ☆48Updated 5 years ago
- ☆46Updated 3 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆173Updated 8 months ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆64Updated 5 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- (kinda) Malicious Outlook Reader☆135Updated 4 years ago
- Code Exec via Excel☆87Updated 7 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- ☆70Updated 3 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Suite of Shellcode Running Utilities☆111Updated 5 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago