matro7sh / havoc-sharPersistView external linksLinks
☆14Dec 5, 2024Updated last year
Alternatives and similar repositories for havoc-sharPersist
Users that are interested in havoc-sharPersist are comparing it to the libraries listed below
Sorting:
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆78Feb 6, 2026Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Sep 4, 2023Updated 2 years ago
- ☆26Aug 5, 2025Updated 6 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 10 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 6 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆82Feb 10, 2026Updated last week
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 5 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Feb 8, 2023Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 10 months ago
- Cisco Password Encryptor/Decryptor☆26Jul 11, 2023Updated 2 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Jun 2, 2025Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Mar 24, 2024Updated last year
- ☆27Jun 3, 2023Updated 2 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 2 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago