Automated Persistence and Lateral Movement using GCP Patch Management
☆16Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for patchy
Users that are interested in patchy are comparing it to the libraries listed below
Sorting:
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆15Oct 24, 2021Updated 4 years ago
- An example of Windows self-replicating malware.☆11Jan 16, 2023Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆21Jan 7, 2026Updated last month
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Virtual File System supporting Different Functions (adding , copying from and to Hard Disk , Deleting Files and Folders)☆11Jul 13, 2017Updated 8 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- ☆18Jan 9, 2026Updated last month
- ☆22Aug 28, 2023Updated 2 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- Pure Go lang cryptor and shellcode injector☆20Feb 25, 2021Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- ☆19Sep 24, 2025Updated 5 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated 2 weeks ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- ☆22Sep 25, 2022Updated 3 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year