utkusen / firstorder
A traffic analyzer to evade Empire's communication from Anomaly-Based IDS
☆108Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for firstorder
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 7 years ago
- For all your network pentesting needs☆150Updated 4 months ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Reconnaissance tool for Microsoft Office 365☆66Updated 6 years ago
- Powershell Empire Persistence finder☆117Updated 7 years ago
- Responsive Command and Control System☆101Updated 2 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Pypykatz server☆124Updated 5 years ago
- ☆98Updated 5 years ago
- An automated SMB relay exploitation script.☆151Updated 8 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated this week
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 4 years ago
- ☆59Updated 4 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 7 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆66Updated 2 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆164Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 5 months ago