mandiant / harbingerLinks
☆92Updated last week
Alternatives and similar repositories for harbinger
Users that are interested in harbinger are comparing it to the libraries listed below
Sorting:
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆33Updated 5 months ago
- Your Skyfall Infrastructure Pack☆76Updated 2 months ago
- Utilities for obfuscating shellcode☆71Updated 4 months ago
- Living Off the Foreign Land setup scripts☆70Updated 5 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆76Updated 7 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆51Updated 3 weeks ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆122Updated last month
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated 7 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 10 months ago
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- ☆50Updated 9 months ago
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆68Updated this week
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆144Updated 11 months ago
- ☆89Updated 3 years ago
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆66Updated 3 months ago
- ☆65Updated last year
- A simple POC to expose Mythic as a MCP server☆66Updated 4 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆43Updated last month
- Red Team Collaboration Infrastructure☆95Updated 3 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Sniffing files generator☆59Updated 5 months ago
- ☆44Updated last year
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- Lifetime AMSI bypass.☆35Updated 3 months ago
- ☆72Updated last month