leoloobeek / mfastealer
Stealing MFA/2FA tokens and using them to logon with VPN clients
☆17Updated 6 years ago
Related projects: ⓘ
- Methods of C2☆21Updated 9 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Enumerate RIDs using pure Python☆30Updated last month
- ☆16Updated 7 years ago
- Generic malicious browser check written in C#☆12Updated 8 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆77Updated 3 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆48Updated last year
- automatic scan for hackthebox☆14Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 5 months ago
- AV/EDR evasion via direct system calls.☆32Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆34Updated 4 years ago
- Automating those tasks which can or should be automated☆58Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆13Updated this week
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- ☆19Updated this week
- ☆36Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆20Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- ☆23Updated 3 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 5 years ago