purplestormctf / purplestorm-TTPs
A collection of commands, tools, techniques and procedures of the purplestorm ctf team.
☆9Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for purplestorm-TTPs
- A collection of tools that I use in CTF's or for assessments☆59Updated last month
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆45Updated 2 weeks ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆16Updated this week
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆90Updated last week
- A small red team course☆32Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆15Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated 3 weeks ago
- ☆35Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Simple netexec wraper with html repport☆17Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆14Updated last year
- ☆51Updated 9 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- ☆53Updated last month
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year