password-reset / TrelloC2Links
Simple C2 over the Trello API
☆38Updated 2 years ago
Alternatives and similar repositories for TrelloC2
Users that are interested in TrelloC2 are comparing it to the libraries listed below
Sorting:
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- ☆50Updated 5 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- ☆24Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆19Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ☆17Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated 3 weeks ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago