mttaggart / OffensiveNotion
Notion as a platform for offensive operations
ā1,147Updated last year
Alternatives and similar repositories for OffensiveNotion:
Users that are interested in OffensiveNotion are comparing it to the libraries listed below
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsā1,430Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.ā1,380Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. š¦ā978Updated 3 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsā1,182Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTā713Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)ā1,439Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.ā783Updated 10 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.ā1,888Updated last week
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).ā1,067Updated 3 weeks ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.ā1,357Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.ā2,786Updated last year
- ā1,884Updated last year
- Some notes and examples for cobalt strike's functionalityā1,002Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.ā1,047Updated 2 weeks ago
- The swiss army knife of LSASS dumpingā1,854Updated 5 months ago
- Identify privilege escalation paths within and across different cloudsā680Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDRā2,642Updated last week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingā1,011Updated 5 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!ā1,872Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)ā1,069Updated 8 months ago
- Tool for Active Directory Certificate Services enumeration and abuseā2,584Updated 6 months ago
- Template-Driven AV/EDR Evasion Frameworkā1,629Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsā1,912Updated 2 weeks ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cā¦ā1,023Updated 3 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlationā952Updated 2 years ago
- A unique technique to execute binaries from a password protected zipā1,015Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Frameworkā1,507Updated 2 weeks ago
- A simple python packer to easily bypass Windows Defenderā632Updated 2 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Teamā1,097Updated 7 months ago
- Red Team Cheatsheet in constant expansion.ā1,160Updated last year