mgeeky / digitalocean-app-redirectorView external linksLinks
Reverse-HTTP Redirector via DigitalOcean Apps Platform
☆31Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for digitalocean-app-redirector
Users that are interested in digitalocean-app-redirector are comparing it to the libraries listed below
Sorting:
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last week
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- A collection of presentations and other contributions I have made to conferences.☆37Sep 9, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Apr 30, 2024Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226May 3, 2023Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆22Jan 30, 2026Updated 2 weeks ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆13Oct 29, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Aug 8, 2022Updated 3 years ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- A cmake template for crystal palace☆38Dec 20, 2025Updated last month
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- ☆152Mar 26, 2025Updated 10 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Jul 5, 2023Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆144Oct 24, 2021Updated 4 years ago