itaymigdal / LOLSpoof
An interactive shell to spoof some LOLBins command line
☆179Updated 7 months ago
Related projects: ⓘ
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- Continuous password spraying tool☆112Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 3 months ago
- C2 Infrastructure Automation☆82Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- ☆131Updated 3 months ago
- ☆222Updated this week
- ☆181Updated 7 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆245Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆80Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆145Updated 5 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆171Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆155Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- Python utility that generates "imageless" QR codes in various formats☆88Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆126Updated last month
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- ☆260Updated last year
- 「💀」Proof of concept on BYOVD attack☆147Updated 6 months ago
- ☆171Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆259Updated 11 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆87Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆131Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆117Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆136Updated last month
- ☆110Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆266Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆144Updated 10 months ago