gmatuz / npm-initial-access
Easy to extend initial access scenario to help with EDR testing on Linux and Mac
☆23Updated 2 years ago
Alternatives and similar repositories for npm-initial-access:
Users that are interested in npm-initial-access are comparing it to the libraries listed below
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- ☆41Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- ☆37Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆67Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- ☆38Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ☆18Updated 9 months ago
- ☆13Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- pypykatz plugin for volatility3 framework☆39Updated 9 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆13Updated 6 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- An Ansible role for installing Cobalt Strike.☆75Updated last month