matro7sh / YelaaLinks
Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given perimeter )
☆25Updated last year
Alternatives and similar repositories for Yelaa
Users that are interested in Yelaa are comparing it to the libraries listed below
Sorting:
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ☆52Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated 3 weeks ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆12Updated 4 months ago
- ☆48Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- ☆26Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- offensive notes & resources☆43Updated 2 months ago
- ☆18Updated 8 months ago
- ☆48Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆21Updated 3 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Updated last year
- ☆22Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago