itm4n / Ikeext-Privesc
☆132Updated this week
Related projects: ⓘ
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- ☆85Updated this week
- ☆92Updated 5 years ago
- ☆84Updated this week
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆111Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆104Updated 6 years ago
- ☆144Updated this week
- ☆67Updated this week
- ☆73Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆224Updated last year
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Pypykatz agent implemented in .NET☆85Updated 5 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆108Updated 6 years ago
- MS17-010☆63Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Updated 3 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆116Updated 8 years ago
- How To Execute Shellcode via HTA☆135Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆144Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆145Updated 4 years ago
- ☆89Updated this week
- Port of eternal blue exploits to powershell☆148Updated 7 years ago