Category: Post Exploitation

CrackMapExec

CrackMapExecWin: CrackMapExec compiled for Windows

CrackMapExecWin CrackMapExec v5.1.0 compiled for Windows Features Latest v5.1 version Compiled for windows x64 platforms Usage Download Crackmapexec from Release section Download and Install the VC_redist.x64.exe ‘Microsoft Visual C++ 2017 Redistributable (x64)‘ Download and...

SharpHound

SharpHound: C# Rewrite of the BloodHound Ingestor

SharpHound – C# Rewrite of the BloodHound Ingestor Usage Enumeration Options CollectionMethod – The collection method to use. This parameter accepts a comma-separated list of values. Has the following potential values (Default: Default): Default –...

TikiTorch

TikiTorch: Process Hollowing

TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, then uses CreateRemoteThread to run the desired shellcode within that target process. Both the process and...

Freedom Fighting Mode

Freedom Fighting Mode: open source hacking harness

Freedom Fighting Mode (FFM) FFM is a hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. The idea of the tool was derived from a 2007 conference from @thegrugq. It was...