obscuritylabs / operator-up
Helpful operator notes and techniques in actionable form
☆16Updated last year
Alternatives and similar repositories for operator-up:
Users that are interested in operator-up are comparing it to the libraries listed below
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- ☆24Updated 3 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆48Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Ansible role that Installs Mythic☆14Updated 9 months ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- ☆19Updated 4 years ago
- ☆17Updated 6 years ago
- Caesar-Cipher based encryption☆29Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆26Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- Continuous kerberoast monitor☆44Updated last year
- ☆13Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- ☆20Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 5 years ago
- ☆13Updated last year
- ☆37Updated 3 years ago
- ☆39Updated 6 years ago