mgeeky / RobustPentestMacroLinks
This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploitation techniques.
☆144Updated 3 years ago
Alternatives and similar repositories for RobustPentestMacro
Users that are interested in RobustPentestMacro are comparing it to the libraries listed below
Sorting:
- ObscurityLabs RedTeam C# Toolkit☆123Updated 5 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆140Updated 4 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- DLL Generator for side loading attack☆173Updated 6 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆143Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆241Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- ☆177Updated 6 years ago
- An Insider Threat Toolkit☆152Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆99Updated 2 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆122Updated 2 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Updated 6 years ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 8 months ago
- Tool for password spraying RDP☆96Updated 6 years ago
- Windows RID Hijacking persistence technique☆175Updated 7 months ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- ☆42Updated 7 years ago
- ☆94Updated 6 years ago
- DeepSea Phishing Gear☆122Updated 4 years ago
- How To Execute Shellcode via HTA☆140Updated 7 years ago
- A tool to create obfuscated HTA script.☆178Updated 4 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, …☆186Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆232Updated 2 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 4 months ago