thelikes / arsenal
miscellaneous sploit scripts/hacks
☆13Updated 2 months ago
Related projects: ⓘ
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- ☆11Updated 4 years ago
- ☆16Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆15Updated 3 months ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- ☆23Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- ☆20Updated this week
- ☆13Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆10Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆12Updated last year
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- c# reverse shell poc☆27Updated 5 years ago
- Recon-ng modules for basic OSINT.☆9Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Simple C2 over the Trello API☆37Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆12Updated last year