tanc7 / dark-lord-obamaLinks
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
☆74Updated 4 years ago
Alternatives and similar repositories for dark-lord-obama
Users that are interested in dark-lord-obama are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆118Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Some random tools I use for penetration testing☆89Updated 7 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆72Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Phish password protected Excel-Files☆107Updated last year
- Password Spraying Framework☆63Updated 3 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 11 months ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Updated 4 years ago