sliverarmory / armoryLinks
The Official Sliver Armory
☆114Updated 4 months ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆169Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆116Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆219Updated this week
- My implementation of the GIUDA project in C++☆185Updated 2 years ago
- Shaco is a linux agent for havoc☆165Updated last year
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Havoc C2 profile generator☆92Updated last month
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆117Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆258Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆88Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆304Updated 2 years ago
- ☆208Updated 3 months ago
- SeRestorePrivilege to SYSTEM☆122Updated 3 years ago
- ☆222Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆330Updated last month
- (Demo) 3rd party agent for Havoc☆141Updated 2 years ago
- Evasive Golang Loader☆134Updated last year
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆277Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- Execute shellcode files with rundll32☆208Updated last year
- A BOF to automate common persistence tasks for red teamers☆285Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆199Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆141Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- ☆83Updated last year
- Port of Cobalt Strike's Process Inject Kit☆184Updated 8 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆162Updated 2 years ago