☆17Sep 10, 2021Updated 4 years ago
Alternatives and similar repositories for s3c2
Users that are interested in s3c2 are comparing it to the libraries listed below
Sorting:
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- ☆127Jul 10, 2024Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- 通过微信公众号推送漏洞消息☆18Dec 27, 2021Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- ☆46Jul 13, 2021Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Swift-based fuzzing tools☆21May 22, 2023Updated 2 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- Objective-C runtime library wrapper for Nim☆19Jun 7, 2017Updated 8 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆61Aug 4, 2022Updated 3 years ago
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Mar 11, 2019Updated 6 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year