Generates anti-sandbox analysis HTA files without payloads
☆16Mar 16, 2017Updated 9 years ago
Alternatives and similar repositories for genHTA
Users that are interested in genHTA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- Small random scripts for various things I find myself needing to repeat/automate☆24Apr 6, 2021Updated 4 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Nov 17, 2017Updated 8 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆488May 23, 2023Updated 2 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- USB HID for Penetration Testing☆13Apr 6, 2016Updated 9 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆68Mar 6, 2020Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆73Aug 14, 2021Updated 4 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- ☆29Oct 17, 2018Updated 7 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago