Helpful operator notes and techniques in actionable form
☆17Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for operator-up
Users that are interested in operator-up are comparing it to the libraries listed below
Sorting:
- ☆127Jun 19, 2020Updated 5 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- https://jimshaver.net/2018/02/22/net-over-net-breaking-the-boundaries-of-the-net-framework/☆19Feb 23, 2018Updated 8 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Oct 28, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Sep 14, 2021Updated 4 years ago
- Fraktal's Ransomware Emulator☆101Apr 5, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- ☆119Jun 17, 2021Updated 4 years ago
- ☆26May 22, 2021Updated 4 years ago
- Windows Process Injection Toolkit - plain and simple :)☆28Jul 29, 2018Updated 7 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- ☆28Apr 3, 2021Updated 4 years ago