xct / morbolLinks
Simple AV Evasion for PE Files
☆42Updated 3 years ago
Alternatives and similar repositories for morbol
Users that are interested in morbol are comparing it to the libraries listed below
Sorting:
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- ☆21Updated 3 years ago
- ☆123Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆92Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- offensive notes & resources☆43Updated 3 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- ☆9Updated 4 years ago
- Creates and sends fake meeting invite☆67Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 5 years ago
- ☆140Updated last year
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- ☆13Updated 3 months ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆47Updated 3 years ago
- ☆117Updated 4 years ago
- Buggy script to play with GPOs☆111Updated 7 months ago
- python spraying tools based on impacket lib☆53Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆110Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 7 months ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- ☆112Updated 2 years ago
- ☆36Updated 3 years ago