s0lst1c3 / dropengine
DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
☆208Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for dropengine
- ☆257Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆413Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- A modular C2 framework☆398Updated this week
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆397Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆296Updated last year
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆341Updated 4 years ago
- ☆161Updated last year
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆244Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆220Updated 4 years ago
- ☆350Updated 3 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆251Updated 3 years ago
- Kerberoast attack -pure python-☆421Updated 11 months ago
- Disposable and resilient red team infrastructure with Terraform☆253Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- easy-to-use payload hosting☆264Updated 2 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆211Updated 2 years ago
- Microsoft External Attack Tool☆177Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆212Updated last year
- lateral movement techniques that can be used during red team exercises☆265Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆200Updated 4 years ago
- Presentation material presented by Outflank team members at public events.☆181Updated this week
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆197Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆267Updated 3 weeks ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆346Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆240Updated 4 years ago