Category: Post Exploitation

shad0w: post exploitation framework

shad0w SHAD0W is a modular C2 framework designed to successfully operate in mature environments. It will use a range of methods to evade EDR and AV while allowing the operator to continue using tooling...

TREVORspray

TREVORspray: featureful Python O365 sprayer

TREVORspray A featureful Python O365 sprayer based on MSOLSpray which uses the Microsoft Graph API Microsoft is getting better and better about blocking password spraying attacks against O365. TREVORspray can solve this by proxying its requests through an...

Impost3r

Impost3r: A linux password thief

Impost3r Impost3r is a tool that aims to steal many kinds of Linux passwords(including ssh,su,sudo) written by C Attackers can use Impost3r to make a trap to steal the legal user’s passwords XD This...

UACME

UACME v3.2.7 releases: Defeating Windows User Account Control

UACMe Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version too). Admin account with UAC set on default settings...