xorrior / poseidon
Apfell Golang macOS/Linux/Windows implant
☆89Updated 3 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- ☆110Updated 7 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 6 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- ☆98Updated 4 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- CobaltStrike External C2 for Websockets☆193Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- ☆70Updated 6 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆137Updated 5 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- ☆76Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- ☆83Updated 9 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- DLL Generator for side loading attack☆173Updated 6 years ago