ihack4falafel / SubRosa
Basic tool to automate backdooring PE files
☆55Updated 3 years ago
Alternatives and similar repositories for SubRosa:
Users that are interested in SubRosa are comparing it to the libraries listed below
- automatic scan for hackthebox☆13Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- Scripts for OSCE☆18Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆20Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆16Updated 7 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆35Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- ☆23Updated 4 years ago
- Random code snippets☆10Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆15Updated 2 years ago
- Combined PowerShell and CMD Reverse Shell☆12Updated 5 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- AMSI bypass stager generator☆28Updated 6 years ago