im4x5yn74x / dropper2
Yet another cross compiling reverse/bind payload generator written in Go.
☆12Updated 3 years ago
Alternatives and similar repositories for dropper2:
Users that are interested in dropper2 are comparing it to the libraries listed below
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated this week
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- ☆24Updated 3 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- (kinda) Malicious Outlook Reader☆18Updated 4 years ago
- ☆39Updated 6 years ago
- ☆17Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆34Updated 2 years ago
- ☆17Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆16Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago