password-reset / TrelloC2Links
Simple C2 over the Trello API
☆38Updated 2 years ago
Alternatives and similar repositories for TrelloC2
Users that are interested in TrelloC2 are comparing it to the libraries listed below
Sorting:
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- ☆17Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- ☆24Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- ☆18Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago