password-reset / TrelloC2
Simple C2 over the Trello API
☆37Updated last year
Related projects ⓘ
Alternatives and complementary repositories for TrelloC2
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Compiled Binaries for Sharp Suite☆13Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Everything related to Cobalt Strike☆15Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- ☆23Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 3 years ago
- ☆16Updated 3 years ago
- ☆16Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- ☆37Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Updated last year
- Execute embedded Mimikatz☆13Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago