hlldz / pickl3
Windows active user credential phishing tool
☆277Updated 4 years ago
Related projects: ⓘ
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆245Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆213Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆331Updated last year
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆223Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆306Updated 9 months ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆323Updated 3 years ago
- Evading Anti-Virus with Unusual Technique☆210Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆309Updated last year
- This is a weaponized WSUS exploit☆278Updated last year
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- ☆345Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆215Updated 2 years ago
- Powershell crazy and sometimes diabolic scripts☆140Updated 4 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆197Updated 3 years ago
- Aggressor scripts I've made for Cobalt Strike☆402Updated last year
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆371Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆272Updated 4 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆461Updated 2 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆123Updated 5 years ago
- Passwords Recovery Tool☆215Updated 3 years ago
- ☆310Updated this week
- ☆291Updated this week
- Shellcoding utilities☆216Updated 3 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆337Updated 3 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆244Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆253Updated 3 years ago
- ☆347Updated 2 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆197Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆339Updated 3 years ago