yoda66 / MAASLinks
Malware As A Service
☆136Updated last year
Alternatives and similar repositories for MAAS
Users that are interested in MAAS are comparing it to the libraries listed below
Sorting:
- ☆153Updated 8 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- pysnaffler☆106Updated 3 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆179Updated 2 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- ☆227Updated 5 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- ☆163Updated 5 months ago
- A Python POC for CRED1 over SOCKS5☆161Updated last year
- Parses Snaffler output file and generate beautified outputs.☆111Updated 10 months ago
- Python utility that generates "imageless" QR codes in various formats☆131Updated last year
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆274Updated 5 months ago
- Identifies the bytes that Microsoft Defender flags on.☆95Updated 3 years ago
- ☆119Updated 8 months ago
- ☆214Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆143Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆204Updated last year
- ☆195Updated 3 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆181Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆161Updated 11 months ago
- Payload Generation Framework☆96Updated last year
- ☆79Updated 10 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆128Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆71Updated 8 months ago
- ☆25Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 6 months ago
- ☆167Updated 4 months ago