ville87 / offsec
offensive security scripts and documentation
☆30Updated 3 weeks ago
Alternatives and similar repositories for offsec:
Users that are interested in offsec are comparing it to the libraries listed below
- ☆26Updated last year
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- ☆58Updated 5 months ago
- PowerShell Reverse Shell☆61Updated last year
- Tool for enumerating Active Directory environments☆46Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆26Updated last year
- My Favorite Offensive Security Scripts☆69Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- A Moodle Scanner☆40Updated 4 months ago
- ☆51Updated last year
- Cobalt Strike BOFS☆15Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- ☆83Updated 2 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- ☆52Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 11 months ago
- POC for DLL Proxying / Hijacking☆60Updated 3 weeks ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year