Stars
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
Your template-based BloodHound terminal companion tool
A tool to transform Chromium browsers into a C2 Implant
C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pivot and more.
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Reaping treasures from strings in remote processes memory
COM ViewLogger — new malware keylogging technique
.NET assembly loader with patchless AMSI and ETW bypass
PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager
Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.
Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies
A set of programs for analyzing common vulnerabilities in COM
BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions
Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io
The recursive internet scanner for hackers. 🧡
Bounces when a fish bites - Evilginx database monitoring with exfiltration automation
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
A small script that automates Entra ID persistence with Windows Hello For Business key
Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.