r00t0v3rr1d3 / armitageView external linksLinks
Fork from @rsmudge/armitage
☆140Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for armitage
Users that are interested in armitage are comparing it to the libraries listed below
Sorting:
- Fork from @rsmudge/armitage☆34Dec 6, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆21Sep 1, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Apr 10, 2022Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- Hosting PowerShell in Python☆42Jun 17, 2022Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- An Office365 User Attack Tool☆645Mar 19, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆337Jan 16, 2022Updated 4 years ago
- Red Team Attack Lab for TTP testing & research☆593May 15, 2023Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆13Apr 2, 2024Updated last year
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆12Oct 15, 2024Updated last year
- DLL Hijack Search Order Enumeration BOF☆149Nov 3, 2021Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆123Mar 25, 2022Updated 3 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Sep 2, 2024Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 3 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago