ville87 / offsec
offensive security scripts and documentation
☆30Updated this week
Related projects: ⓘ
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆72Updated 3 months ago
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- POC for a DLL spoofer to determine DLL Hijacking☆60Updated 11 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆50Updated last month
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆38Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆51Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆68Updated 7 months ago
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- ☆24Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆38Updated 7 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆72Updated 10 months ago
- quick and dirty proof-of-concept to hide shells in images☆48Updated 2 months ago
- ☆46Updated 2 years ago
- PowerShell Reverse Shell☆60Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆28Updated last year
- ☆50Updated 7 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 6 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- ☆35Updated 9 months ago
- vulnlab.com reaper writeup☆25Updated last year
- ☆23Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆52Updated 3 months ago