mishmashclone / mantvydasb-RedTeam-Tactics-and-TechniquesLinks
https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
☆17Updated 3 years ago
Alternatives and similar repositories for mantvydasb-RedTeam-Tactics-and-Techniques
Users that are interested in mantvydasb-RedTeam-Tactics-and-Techniques are comparing it to the libraries listed below
Sorting:
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆89Updated 3 years ago
- C# tool to discover low hanging fruits☆94Updated 2 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 4 years ago
- ☆38Updated 5 years ago
- ☆70Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- Simple rapper for Mimikatz, bypass Defender☆141Updated 3 years ago
- Extendable payload obfuscation and delivery framework☆146Updated 2 years ago
- ☆95Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆185Updated 3 weeks ago
- A sort of simple shell which support multiple protocols.☆100Updated 5 years ago
- ☆131Updated 4 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110Updated 5 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated this week
- Some random tools I use for penetration testing☆91Updated 4 months ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 4 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- ☆160Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- A Cobaltstrike container, built for Warhorse☆36Updated last year
- Azure AD Password Checker☆85Updated 7 months ago
- AutoStart teamserver and listeners with services☆74Updated 3 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- Phish password protected Excel-Files☆105Updated last year
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆175Updated 5 years ago