xct / morbolLinks
Simple AV Evasion for PE Files
☆42Updated 3 years ago
Alternatives and similar repositories for morbol
Users that are interested in morbol are comparing it to the libraries listed below
Sorting:
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆123Updated 2 years ago
- ☆112Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- ☆140Updated last year
- ☆21Updated 3 years ago
- ☆13Updated 5 months ago
- python spraying tools based on impacket lib☆54Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 6 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- Buggy script to play with GPOs☆115Updated 9 months ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- ☆47Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- ☆117Updated 4 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- C# tool to discover low hanging fruits☆94Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- OSCP Cheatsheets☆98Updated 6 years ago
- ☆129Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year