hackerschoice / hackshell
Make BASH stealthy and hacker friendly with lots of bash functions
☆170Updated this week
Related projects: ⓘ
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆339Updated 5 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆236Updated 7 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆169Updated 5 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆327Updated 2 weeks ago
- Lab used for workshop and CTF☆82Updated this week
- ☆171Updated last month
- Azure mindmap for penetration tests☆157Updated 9 months ago
- Different methods to get current username without using whoami☆170Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆120Updated 3 weeks ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆465Updated 2 months ago
- ☆282Updated 9 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆214Updated last month
- Everything and anything related to password spraying☆122Updated 4 months ago
- ☆181Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated last week
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆208Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- Ping-based Information Lookup and Outbound Transfer☆70Updated 5 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆301Updated 5 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆327Updated 6 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 8 months ago
- ☆474Updated 5 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆137Updated 3 months ago
- Offensive Lua.☆174Updated 10 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆149Updated 3 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆77Updated 6 months ago
- An ADCS honeypot to catch attackers in your internal network.☆182Updated 2 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆245Updated last year
- ☆173Updated 2 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆226Updated 6 months ago