sneakerhax / ContainersLinks
Red Team tools containerized
☆74Updated last week
Alternatives and similar repositories for Containers
Users that are interested in Containers are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 8 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆204Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆163Updated 4 months ago
- ☆62Updated this week
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated last month
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆352Updated this week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 9 months ago
- The different ways to dump lsass☆201Updated 4 months ago
- Our Tips&Tricks☆127Updated 9 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 8 months ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 4 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆211Updated this week
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆116Updated 3 weeks ago
- ☆185Updated last month
- ☆163Updated 3 weeks ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 7 months ago
- ☆53Updated 3 weeks ago
- Group Policy Objects manipulation and exploitation framework☆280Updated last week
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆97Updated 3 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Updated 6 months ago
- Persist like a Dodder☆66Updated 6 months ago
- ☆79Updated 7 months ago
- Execute shellcode via ASPNET compiler☆58Updated 2 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆62Updated 2 weeks ago
- ☆74Updated 10 months ago
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- sl0ppy-PrivescTaskCreator.ps1☆37Updated 2 months ago
- Enumerate active EDR's on the system☆146Updated 2 months ago