Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
☆63Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for Azur3Alph4
Users that are interested in Azur3Alph4 are comparing it to the libraries listed below
Sorting:
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Jul 10, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆187Jul 21, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆139Mar 19, 2024Updated last year
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- ☆176Apr 22, 2023Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆146May 1, 2021Updated 4 years ago
- Cobalt Strike Beacon Object Files☆167May 2, 2022Updated 3 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55May 8, 2022Updated 3 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆211Mar 18, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Jul 30, 2021Updated 4 years ago
- Dumping LAPS from Python☆282Dec 7, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated last year
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Mar 8, 2023Updated 2 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Sep 21, 2021Updated 4 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago