mertdas / Slayer
Just an AV slayer. Nothing special ;)
☆212Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Slayer
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆309Updated last month
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆452Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆300Updated 3 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆378Updated 7 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 4 months ago
- Password spraying tool and Bloodhound integration☆212Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆372Updated last year
- Shellcode launcher for AV bypass☆215Updated 11 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆367Updated 5 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆292Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆431Updated last week
- ☆95Updated 2 years ago
- Certified Red Team Operator☆197Updated 2 years ago
- ☆401Updated 11 months ago
- ☆214Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆254Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆279Updated 3 months ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆394Updated 9 months ago
- A script to dump files and folders remotely from a Windows SMB share.☆211Updated 4 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆198Updated 11 months ago
- Amsi Bypass payload that works on Windwos 11☆370Updated last year
- LDAP enumeration tool implemented in Python3☆219Updated 2 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆180Updated 3 months ago
- Hiding GoPhish from the boys in blue☆173Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆231Updated 3 weeks ago
- Useful C2 techniques and cheatsheets learned from engagements☆428Updated last month
- More examples using the Impacket library designed for learning purposes.☆262Updated 2 years ago