Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.
☆15Jun 5, 2017Updated 8 years ago
Alternatives and similar repositories for Invoke-ProcessScan
Users that are interested in Invoke-ProcessScan are comparing it to the libraries listed below
Sorting:
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- AWS IAM resources search tool☆21May 5, 2021Updated 4 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- ☆26Apr 1, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Volatility Dockerfile☆32Oct 3, 2022Updated 3 years ago
- Search public IP owner through ARIN☆60May 23, 2025Updated 9 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 2 months ago
- Apache Thrift Decoder☆35Dec 7, 2017Updated 8 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- ☆10Oct 9, 2024Updated last year
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- ☆37Aug 8, 2021Updated 4 years ago
- Simple TTY cheat sheet for shell stabilization☆42Oct 25, 2020Updated 5 years ago
- Debugging library to quickly get the minimal crashing test case☆38May 17, 2018Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year