Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
☆63Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for Azur3Alph4
Users that are interested in Azur3Alph4 are comparing it to the libraries listed below
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Jul 10, 2024Updated last year
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆186Jul 21, 2022Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- ☆176Apr 22, 2023Updated 2 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆140Mar 19, 2024Updated 2 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- Cobalt Strike Beacon Object Files☆167May 2, 2022Updated 3 years ago
- ☆94May 14, 2022Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆107Mar 8, 2023Updated 3 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆211Mar 18, 2024Updated 2 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆549Jul 16, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- PoSh BloodHound Dog Whisperer☆192May 23, 2023Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆570Mar 28, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Mar 13, 2023Updated 3 years ago