purplestormctf / purplestorm-TTPs
A collection of commands, tools, techniques and procedures of the purplestorm ctf team.
☆9Updated 6 months ago
Alternatives and similar repositories for purplestorm-TTPs:
Users that are interested in purplestorm-TTPs are comparing it to the libraries listed below
- purplestorm writeup collection☆16Updated last week
- UAC Bypass using CMSTP in Rust☆22Updated last month
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆80Updated this week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated last month
- A small red team course☆34Updated last year
- Inject RDPThief into memory with PowerShell.☆58Updated 3 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆65Updated this week
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆26Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 7 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 4 months ago
- Various AD tools needed for penetration testing in one place.☆23Updated last year
- Lifetime AMSI bypass.☆35Updated 6 months ago
- ☆31Updated 3 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- ☆54Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 6 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- An offensive security framework for writing payloads☆15Updated 2 years ago
- ☆51Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆41Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week