A collection of scripts used to support an OffSecOps pipeline.
☆15Jan 31, 2021Updated 5 years ago
Alternatives and similar repositories for offsecops-shared-library
Users that are interested in offsecops-shared-library are comparing it to the libraries listed below
Sorting:
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129May 25, 2021Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 2 months ago
- ☆23May 28, 2021Updated 4 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆80Dec 22, 2025Updated 2 months ago
- Tools for taking over Crestron Windows CE devices☆36Jul 11, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- Click Once + App Domain☆64Dec 4, 2023Updated 2 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆185Feb 11, 2021Updated 5 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago