☆20Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for ADLab
Users that are interested in ADLab are comparing it to the libraries listed below
Sorting:
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- ☆22Aug 11, 2021Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- A project to maintain the list of CrowdStrike Falcon IP addressing for use in dynamic objects/lists on firewalls☆23Dec 8, 2021Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 10 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆26Feb 11, 2023Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 4 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Simple c# source code obfuscator☆28Feb 13, 2018Updated 8 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆101Jan 26, 2026Updated last month
- My playbook and Tools used for OSCP Exam☆39Oct 27, 2023Updated 2 years ago
- ☆46Dec 5, 2023Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- A Burp extension to Fuzz URLs for HTTP parser inconsistencies☆12Jan 9, 2024Updated 2 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- US Government controls formatted for usability☆16Jul 21, 2021Updated 4 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago