spamv / SharpShooterLinks
Payload Generation Framework
☆9Updated 5 years ago
Alternatives and similar repositories for SharpShooter
Users that are interested in SharpShooter are comparing it to the libraries listed below
Sorting:
- Smuggle a file to a user's browser☆20Updated 3 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- ☆14Updated last year
- Scripts to interact with Microsoft Graph APIs☆42Updated 7 months ago
- ☆25Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆31Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Ansible role that Installs Mythic☆17Updated last year
- Threadless Injection Payload Toolkit☆12Updated last year
- ☆12Updated 4 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆14Updated 3 months ago
- I created a small project to get the private keys and token-signing certificate from an AD FS server to create forged tokens.☆5Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Simple Aggressor Scripts for Cobalt Strike☆12Updated 4 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated last year
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆11Updated 3 weeks ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated 3 months ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago
- ☆37Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆18Updated 4 years ago
- Nemesis agent for Mythic☆27Updated 9 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆24Updated last month