sean-t-smith / T-Mobster_ImplantLinks
Purpose-built Red Team network hardware implant made from common components.
☆22Updated 2 years ago
Alternatives and similar repositories for T-Mobster_Implant
Users that are interested in T-Mobster_Implant are comparing it to the libraries listed below
Sorting:
- Living Off the Foreign Land setup scripts☆70Updated 4 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- Discord C2 Profile for Mythic☆29Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 3 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆49Updated 4 months ago
- ☆70Updated 3 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated last year
- ☆57Updated 7 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Utilities for obfuscating shellcode☆69Updated 3 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- offensive notes & resources☆43Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- ☆38Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- ☆44Updated 11 months ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- ☆140Updated last year
- Custom queries list for BloodHound☆28Updated 10 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year