stufus / parse-mimikatz-logLinks
A relatively flexible tool to parse mimikatz output
☆35Updated 8 years ago
Alternatives and similar repositories for parse-mimikatz-log
Users that are interested in parse-mimikatz-log are comparing it to the libraries listed below
Sorting:
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- ☆55Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 7 years ago
- ☆83Updated 9 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 7 years ago
- ☆44Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 7 years ago
- ☆58Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- ☆41Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago
- ☆19Updated 8 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Updated 8 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆16Updated 10 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- Office365 Tenants List☆16Updated 7 years ago
- ☆24Updated 8 years ago
- A sample bot for Cobalt Strike 3☆22Updated 9 years ago
- ☆94Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- ☆78Updated 7 years ago