LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network
☆74Jul 9, 2019Updated 6 years ago
Alternatives and similar repositories for LogRM
Users that are interested in LogRM are comparing it to the libraries listed below
Sorting:
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- Various Aggressor Scripts I've Created.☆150Jan 1, 2022Updated 4 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- A fully functional DanderSpritz lab in 2 commands☆447May 16, 2019Updated 6 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,050Jan 27, 2026Updated last month
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆302Mar 4, 2020Updated 5 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- A modular C2 framework☆509Updated this week
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago