silence-is-best / files
☆94Updated 4 months ago
Alternatives and similar repositories for files:
Users that are interested in files are comparing it to the libraries listed below
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- ☆187Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- ☆115Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- ☆205Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆181Updated 3 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- A repo to support the book☆106Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆166Updated 4 years ago
- ☆47Updated 4 years ago
- ☆72Updated 2 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆172Updated 5 months ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated 7 months ago
- ☆186Updated last year
- Load any Beacon Object File using Powershell!☆245Updated 3 years ago
- ☆68Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- ☆9Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆82Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆173Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆238Updated 3 years ago
- ☆125Updated 3 years ago
- ☆92Updated 2 years ago
- ☆161Updated 2 years ago