s0lst1c3 / dropengine
DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
☆208Updated 3 years ago
Related projects: ⓘ
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- A modular C2 framework☆393Updated last month
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆179Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆390Updated 2 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆244Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆215Updated 2 years ago
- ☆258Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆412Updated 2 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆207Updated last year
- Dll that can be used for side loading and other attack vector.☆180Updated 4 years ago
- easy-to-use payload hosting☆260Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆453Updated last year
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆513Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆245Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆58Updated 2 years ago
- ☆341Updated 3 years ago
- Disposable and resilient red team infrastructure with Terraform☆248Updated 5 years ago
- ☆253Updated this week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆295Updated last year
- ☆161Updated last year
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 3 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆197Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 2 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆342Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆213Updated 3 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆312Updated 4 years ago