tokyoneon / hashdump.py
macOS/OSX hash dump script taken from Empire framework
☆12Updated 5 years ago
Related projects: ⓘ
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆34Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 3 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆30Updated 3 years ago
- ☆73Updated this week
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆44Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆19Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆18Updated this week
- Automatically spin up infra for phishing☆64Updated 4 years ago
- ☆19Updated this week
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆10Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- ☆16Updated 7 years ago
- Generic malicious browser check written in C#☆12Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated 10 months ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- ☆31Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 2 years ago
- Collection of things I've written on pentests to make life easier.☆15Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago