Category: Ethical Hacking

Active Directory post-exploitation

PsMapExec: Active Directory post-exploitation tool

What is PsMapExec A PowerShell tool heavily inspired by the popular tool CrackMapExec. Far too often I find myself on engagements without access to Linux in order to make use of CrackMapExec. PsMapExec is...

Process Dumper Tool

PPLBlade: Protected Process Dumper Tool

PPLBlade Protected Process Dumper Tool that supports obfuscating memory dump and transferring it on remote workstations without dropping it onto the disk. Key functionalities: Bypassing PPL protection Obfuscating memory dump files to evade Defender...

post-exploitation container

nysm: A stealth post-exploitation container

nysm: A stealth post-exploitation container With the rise in popularity of offensive tools based on eBPF, going from credential stealers to rootkits hiding their own PID, a question came to our mind: Would it...

Offensive MSSQL toolkit

PySQLRecon: Offensive MSSQL toolkit written in Python

PySQLRecon PySQLRecon is a Python port of the awesome SQLRecon project by @sanjivkawa. See the commands section for a list of capabilities. Commands All of the main modules from SQLRecon have equivalent commands. Commands noted with [PRIV] require elevated...

Java archive implant toolkit

JarPlant: Java archive implant toolkit

Java Archive Implant Toolkit Inject malicious payloads into JAR files. Configuration JarPlant supports injection of custom values with the implants. A set of common configuration properties are defined with the template and built-in implants....