huntandhackett / PassiveAggression
Source code and examples for PassiveAggression
☆54Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for PassiveAggression
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- 🌩️ Collection of BloodHound queries for Azure☆44Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- DFSCoerce exe revisited version with custom authentication☆37Updated 10 months ago
- ☆43Updated 4 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆20Updated 3 months ago
- ☆46Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 7 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- ☆92Updated 9 months ago
- Sniffing files generator☆40Updated last week
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆30Updated 6 months ago
- TokenCert☆86Updated last week
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Lateral Movement via the .NET Profiler☆76Updated this week
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆57Updated 5 months ago
- ☆79Updated 6 months ago
- ☆43Updated 4 months ago
- ☆83Updated 6 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 5 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 8 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆108Updated last month