A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers …


A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers …
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other …
This is a tool that allows you to offensively use YARA to apply a filter to the events being reported …
How it works Scan common ports Send a TCP Syn packet to the destination on the defined port, if the …