puzzlepeaches / sneaky_proxy
Hiding your infrastructure from the boys in blue.
☆20Updated 2 years ago
Related projects: ⓘ
- Convert an LDIF file to JSON files ingestible by BloodHound☆38Updated last week
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆26Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆37Updated 3 years ago
- ☆69Updated 10 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- Microsoft365 Device Code Phishing Framework☆33Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆10Updated 2 years ago
- My BloodHound custom queries☆22Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆60Updated 4 months ago
- Generate droppers with encrypted payloads automatically.☆53Updated 2 years ago
- ☆12Updated last year
- Convert ldapdomaindump to Bloodhound☆76Updated 9 months ago
- ☆51Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆58Updated 2 years ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- Scripts to interact with Microsoft Graph APIs☆29Updated 2 months ago
- ☆42Updated 2 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- Smuggle a file to a user's browser☆18Updated 2 years ago
- Get Fine Grained Password Policy☆62Updated 4 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 5 months ago
- ☆23Updated 3 years ago
- (kinda) Malicious Outlook Reader☆17Updated 3 years ago
- Find Inbound Email Domains☆15Updated 8 months ago
- ☆13Updated 11 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated last month