rvrsh3ll / atomic-red-team
Small and highly portable detection tests.
☆9Updated 7 months ago
Alternatives and similar repositories for atomic-red-team:
Users that are interested in atomic-red-team are comparing it to the libraries listed below
- ☆24Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆17Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- WMI SA stuffs☆29Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- Find Inbound Email Domains☆22Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆31Updated 4 years ago