k-vitali / operation-shadowhammer
This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.
☆12Updated 6 years ago
Alternatives and similar repositories for operation-shadowhammer:
Users that are interested in operation-shadowhammer are comparing it to the libraries listed below
- \ PowerAvails Powershell /☆12Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Random source codes☆25Updated 4 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Mimikatz HashClash☆12Updated 9 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- ☆17Updated 7 years ago
- ☆10Updated 7 years ago
- ☆16Updated 9 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Methods of C2☆21Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- ☆10Updated 4 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- ☆13Updated 3 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- ☆26Updated 5 years ago