qtc-de / crypted-cookie-monster
ccm - A small python library that helps identify vulnerabilities inside of encrypted data
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for crypted-cookie-monster
- pypykatz plugin for volatility3 framework☆31Updated 7 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Password spraying toolkit☆7Updated 4 years ago
- ☆24Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆19Updated last year
- Advisories and Proofs of Concept by BlackArrow☆17Updated 7 months ago
- ☆53Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆18Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- async parser for JET☆21Updated 10 months ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Ansible role to deploy RedELK server☆18Updated last year
- Mythic Developer Series: Workshop Golang Agent☆22Updated last year
- Electron based screenshot scanner☆65Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- In 'n Out - See what goes in and comes out of PEs☆32Updated 2 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- Repository for LNK stuff☆27Updated 2 years ago
- Provides access to libhashcat☆29Updated 7 months ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago