The new name is DeTT&CT
☆24Jul 8, 2019Updated 6 years ago
Alternatives and similar repositories for Blue-ATTACK
Users that are interested in Blue-ATTACK are comparing it to the libraries listed below
Sorting:
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Truecrypt volume parsing library☆33Jun 16, 2020Updated 5 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- ☆25Apr 6, 2018Updated 7 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.☆39Apr 11, 2020Updated 5 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago