xct / morbolLinks
Simple AV Evasion for PE Files
☆42Updated 3 years ago
Alternatives and similar repositories for morbol
Users that are interested in morbol are comparing it to the libraries listed below
Sorting:
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- offensive notes & resources☆43Updated 7 months ago
- ☆122Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 6 years ago
- python spraying tools based on impacket lib☆54Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆10Updated 4 years ago
- ☆21Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆112Updated 2 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- ☆13Updated 7 months ago
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- ☆141Updated 2 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- Buggy script to play with GPOs☆117Updated 10 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- ☆119Updated 4 years ago
- ☆47Updated 3 years ago