n0pe-sled / Apache2-Mod-Rewrite-Setup
Quickly Implement Mod-Rewrite in your infastructure
☆81Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Apache2-Mod-Rewrite-Setup
- Malleable C2 profiles for Cobalt Strike☆68Updated 2 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆44Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆46Updated 6 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 6 years ago
- Automating those tasks which can or should be automated☆60Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆123Updated 5 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- Port of Invoke-Excel4DCOM☆100Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆31Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- A C# implementation of the PowerShell Empire Agent☆72Updated 5 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆121Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 6 years ago
- A collection of useful scripts for Cobalt Strike☆167Updated 3 months ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆162Updated 7 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.