misterch0c / APT34
APT34/OILRIG leak
☆231Updated 5 years ago
Alternatives and similar repositories for APT34:
Users that are interested in APT34 are comparing it to the libraries listed below
- A PowerShell example of the Windows zero day priv esc☆326Updated 6 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆251Updated last year
- Public work for CVE-2019-0708☆291Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆257Updated 6 years ago
- ☆272Updated 2 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆174Updated 4 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆211Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆228Updated 2 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆285Updated 7 years ago
- A client compatible with Metasploit's staging protocol☆255Updated 7 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆443Updated 2 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆323Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆210Updated last month
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆327Updated last year
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated last year
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆240Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆231Updated 2 years ago
- ☆167Updated 7 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆441Updated last year
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 5 years ago
- UAC Bypass with mmc via alpc☆156Updated 6 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Exploits and advisories☆189Updated 4 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- Port of eternal blue exploits to powershell☆150Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated last month
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆521Updated 2 years ago