projectHULK / AD_Recon
☆13Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for AD_Recon
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆10Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆12Updated 7 months ago
- ☆21Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- ☆12Updated this week
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆22Updated 2 months ago
- Small collection of Active Directory pentesting tools.☆27Updated 9 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 5 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- Cobalt Strike BOFS☆16Updated 11 months ago
- Yet, Another Packer/Loader☆25Updated last year
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 10 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Create a lnk shortcut file for Windows☆13Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- Original PoC for CVE-2023-30367☆14Updated 10 months ago
- ☆37Updated 3 weeks ago