thiagomayllart / Harvis
Harvis is designed to automate your C2 Infrastructure.
☆105Updated 2 years ago
Alternatives and similar repositories for Harvis:
Users that are interested in Harvis are comparing it to the libraries listed below
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- MSBuild without MSbuild.exe☆129Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆87Updated 3 years ago
- ☆92Updated 2 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- ☆42Updated 2 years ago
- subTee gists code backups☆37Updated 7 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆103Updated 2 years ago
- ☆35Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆73Updated last year
- ☆161Updated 2 years ago
- ☆69Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆141Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆68Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago
- Port of Invoke-Excel4DCOM☆103Updated 5 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆119Updated 3 years ago
- Outlook persistence using VSTO add-ins☆85Updated 4 years ago