Outflank B.V. (outflanknl)

Outflank B.V.

outflanknl

Geek Repo

Clear advice with a hacker mindset. Red Teaming - Digital Attack Simulation - Incident Detection and Response

Location:Amsterdam, Netherlands, EU

Home Page:https://www.outflank.nl

Github PK Tool:Github PK Tool

Outflank B.V.'s repositories

RedELK

Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.

Language:PythonLicense:BSD-3-ClauseStargazers:2285Issues:81Issues:140

EvilClippy

A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

Language:C#License:GPL-3.0Stargazers:2047Issues:89Issues:45

Dumpert

LSASS memory dumper using direct system calls and API unhooking.

C2-Tool-Collection

A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

Invoke-ADLabDeployer

Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.

Language:PowerShellLicense:BSD-3-ClauseStargazers:474Issues:30Issues:0

SharpHide

Tool to create hidden registry keys.

Spray-AD

A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.

Ps-Tools

Ps-Tools, an advanced process monitoring toolkit for offensive operations

Excel4-DCOM

PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)

Language:PowerShellStargazers:320Issues:28Issues:0

Recon-AD

Recon-AD, an AD recon tool based on ADSI and reflective DLL’s

InlineWhispers

Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)

Scripts

Small scripts that make life better

FindObjects-BOF

A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles.

Language:CStargazers:267Issues:17Issues:0

WdToggle

A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.

TamperETW

PoC to demonstrate how CLR ETW events can be tampered.

Language:CStargazers:187Issues:13Issues:0

Zipper

Zipper, a CobaltStrike file and folder compression utility.

HelpColor

Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type

License:BSD-3-ClauseStargazers:185Issues:13Issues:0

Presentations

Presentation material presented by Outflank team members at public events.

Net-GPPPassword

.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.

Language:C#Stargazers:161Issues:12Issues:0

external_c2

POC for Cobalt Strike external C2

DoH_c2_Trigger

Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/

Language:PowerShellStargazers:53Issues:8Issues:0

Training-MSOfficeOffensiveTradecraft

Info related to the Outflank training: Microsoft Office Offensive Tradecraft

unmanaged-dotnet-patch

Modify managed functions from unmanaged code

Language:C++License:MITStargazers:42Issues:0Issues:0

PasswordDump2ELK

Clean public password dump files and store in ELK

RedELK-workshop

Items related to the RedELK workshop given at security conferences

Exploits

Exploits developped by Outflank B.V. team members

Language:PythonStargazers:20Issues:5Issues:0

RedFile

Serving files with conditions, serverside keying and more.

Language:PythonLicense:BSD-3-ClauseStargazers:19Issues:7Issues:1

Invoke-Templator

A PowerShell script to parse the docx/docm file format and update the template location.

Language:PowerShellStargazers:17Issues:6Issues:0

CS-Situational-Awareness-BOF

Situational Awareness commands implemented using Beacon Object Files

Language:CLicense:GPL-2.0Stargazers:1Issues:1Issues:0