rvrsh3ll / Word-Doc-Video-Embed-EXE-POC
☆92Updated 5 years ago
Related projects: ⓘ
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆123Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Updated 3 years ago
- Pypykatz agent implemented in .NET☆85Updated 5 years ago
- ☆108Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- ☆93Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆49Updated 6 years ago
- ☆76Updated this week
- ☆76Updated this week
- ☆52Updated this week
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆46Updated 6 years ago
- Automating those tasks which can or should be automated☆58Updated 6 years ago
- ☆48Updated this week
- InfoPath Phishing Repo Resource☆68Updated 6 years ago
- A C# implementation of the PowerShell Empire Agent☆72Updated 5 years ago
- ☆86Updated this week
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- ☆61Updated this week
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆43Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆83Updated 3 years ago
- ☆57Updated this week
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated last year
- ☆73Updated 7 years ago
- ☆49Updated 6 years ago