Salsa-tools: Shell Reverse and AV bypass, AMSI patched
Salsa Tools – An AV-Safe Reverse Shell Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows...
Salsa Tools – An AV-Safe Reverse Shell Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows...
PurpleSpray Password spraying is an effective technique available to adversaries that allows them to gain access or escalate privileges on Windows environments. This technique can be executed in different variations...
Arsenal Extensible Red Team Framework Arsenal is a framework designed to be a back-end for Red Team command and control operations. It allows many Agent-C2 models to be integrated into...
GadgetToJScript A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS based scripts. The gadget being used triggers a call to...
Exploitation / Post Exploitation
by do son · Published October 3, 2019 · Last modified October 10, 2021
TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, then uses CreateRemoteThread to run the desired shellcode within that target process....
Sharp-Suite SwampThing SwampThing lets you spoof process command line args (x32/64). Essentially you create a process in a suspended state, rewrite the PEB, resume and finally revert the PEB. The...
ConPtyShell ConPtyShell is a Fully Interactive Reverse Shell for Windows systems. The introduction of the Pseudo Console (ConPty) in Windows has improved so much the way Windows handles terminals. ConPtyShell...
BlueCommand BlueCommand is a dashboard and tooling front-end for PowerShell Empire using PowerShell Universal Dashboard from Adam Driscoll. WARNING: This project does not nearly scratch the surface of interacting with all the capabilities of PowerShell Empire....
Flying A False Flag This repo contains the slides and concept code for my BlackHat USA 2019 talk about Command and Control. There are three projects in this repo: CloudRacoon –...
The well-known penetration testing framework Metasploit recently added a utilization module for the high-risk vulnerability BlueKeep in its exploitation modules. BlueKeep is numbered CVE-2019-0708, a high-risk vulnerability discovered in May...
What is Octopus? Octopus is an open-source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S. The main purpose of creating Octopus is for...
GodOfWar – Malicious Java WAR builder A command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby. Features Preexisting payloads. (try -l/–list) cmd_get filebrowser bind_shell...
ProcessInjection What is Process Injection? It is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process...
Check Domain Fronting (chkdfront) chkdfront checks if your domain fronting is working by testing the targeted domain (fronted domain) against your domain front domain. Features Checking your domain fronted against...
Exploitation / Post Exploitation
by do son · Published September 6, 2019 · Last modified October 10, 2021
CIRCO Cisco Implant Raspberry Controlled Operations Designed under Raspberry Pi and aimed for Red Team Ops, we take advantage of “Sec/Net/Dev/Ops” enterprise tools to capture network credentials in a stealth...