sliverarmory / armoryLinks
The Official Sliver Armory
☆116Updated 4 months ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆170Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆121Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆222Updated last week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆89Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆120Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆122Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆285Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆199Updated last year
- Havoc C2 profile generator☆94Updated 2 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- ☆83Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆211Updated last year
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Shaco is a linux agent for havoc☆166Updated last year
- ☆182Updated 3 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆97Updated 4 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆162Updated 2 years ago
- ☆209Updated 4 months ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆279Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Updated 2 years ago
- Evasive Golang Loader☆134Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆141Updated 2 years ago
- ☆222Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆194Updated 2 years ago
- ☆248Updated 2 years ago