thiagomayllart / HarvisLinks
Harvis is designed to automate your C2 Infrastructure.
☆108Updated 2 years ago
Alternatives and similar repositories for Harvis
Users that are interested in Harvis are comparing it to the libraries listed below
Sorting:
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- ☆95Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 3 years ago
- ☆41Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆144Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Updated last year
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆76Updated 2 years ago
- ☆162Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆147Updated 3 years ago
- Cobalt Strike Beacon Object Files☆161Updated 3 years ago
- subTee gists code backups☆36Updated 7 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆230Updated 3 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- UI for creating LNKs☆104Updated 4 years ago