Lists (11)
Sort Name ascending (A-Z)
Starred repositories
LLM Supported Attack Scenario Creator from Code Review
Python api for usage with cobalt strike's External C2 specification
Python api for usage with cobalt strike's External C2 specification
simple client-side in-browser binary analysis and hex dump
Cloud-related research releases from the Rhino Security Labs team.
Some scripts to abuse kerberos using Powershell
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.
A modern 32/64-bit position independent implant template
An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.
Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.
netshell features all in version 2 powershell
sadreck / Codecepticon
Forked from Accenture/Codecepticon.NET/PowerShell/VBA Offensive Security Obfuscator
Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without relying on event logs
Spoofing desktop login applications with WinForms and WPF
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
Identify binaries with Authenticode digital signatures signed to an internal CA/domain
Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations
A Cobaltstrike container, built for Warhorse
Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types
DNS Tunneling using powershell to download and execute a payload. Works in CLM.