HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol. …
LOLBITS v2.0.0 – C2 Framework That Uses Background Intelligent Transfer Service (BITS) As Communication Protocol And Direct Syscalls + Dinvoke For EDR User-Mode Hooking Evasion
LOLBITS is a C2 framework that uses Microsoft’s Background Intelligent Transfer Service (BITS) to establish the communication channel between the …
Vulnerable-AD – Create A Vulnerable Active Directory That’S Allowing You To Test Most Of Active Directory Attacks In Local Lab
Create a vulnerable active directory that’s allowing you to test most of active directory attacks in local lab.Main Features Randomize …
PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage
Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead …
SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS
SkyArk is a cloud security project with two main scanning modules: AzureStealth – Scans Azure environments AWStealth – Scan AWS …
SNOWCRASH – A Polyglot Payload Generator
IntroductionSNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in …
Debotnet – A Tiny Portable Tool For Controlling Windows 10’s Many Privacy-Related Settings And Keep Your Personal Data Private
A free and portable tool for controlling Windows 10’s many privacy-related settings and keep your personal data private. Your preparation …
Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell …
AutoRDPwn v5.1 – The Shadow Attack Framework
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …
Invoker – Penetration Testing Utility
Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some …