Powershell script to exfiltrate large files quickly and securely
☆125May 4, 2022Updated 3 years ago
Alternatives and similar repositories for MagicCopy
Users that are interested in MagicCopy are comparing it to the libraries listed below
Sorting:
- ☆54Aug 13, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Memory Backed Powershell WebDav Server☆138Mar 7, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- ☆36Mar 11, 2019Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Jul 29, 2019Updated 6 years ago
- Python3 tool to perform password spraying using RDP☆667Aug 17, 2023Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- A modular C2 framework☆509Updated this week
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Mar 27, 2023Updated 2 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- ☆229May 10, 2018Updated 7 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Pypykatz server☆123Mar 15, 2019Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago