silence-is-best / filesLinks
☆99Updated 8 months ago
Alternatives and similar repositories for files
Users that are interested in files are comparing it to the libraries listed below
Sorting:
- ☆190Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- ☆116Updated 4 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- A repo to support the book☆108Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 2 months ago
- ☆208Updated 3 years ago
- ☆130Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 11 months ago
- ☆41Updated 5 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆153Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Updated 3 years ago
- Load any Beacon Object File using Powershell!☆254Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆175Updated last week
- ☆9Updated 3 years ago
- ☆162Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- ☆95Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Koppeling x Metatwin x LazySign☆212Updated 3 years ago
- ☆48Updated 5 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Bypassing AppLocker with C#☆141Updated 3 years ago
- ☆72Updated 3 years ago