password-reset / TrelloC2
Simple C2 over the Trello API
☆38Updated 2 years ago
Alternatives and similar repositories for TrelloC2:
Users that are interested in TrelloC2 are comparing it to the libraries listed below
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- ☆24Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- ☆17Updated 4 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- ☆17Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 6 years ago
- ☆19Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Noob Penetration tester☆11Updated 10 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆28Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago