Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AggressorAssessor
Aggressor scripts for phases of a pen test or red team assessment
Apache-Struts2-S2-045-Mass-Scanner
AutoNessus
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause, and resume a scan.
CIMplant
C# port of WMImplant which uses either CIM or WMI to query remote systems
commando-vm
CredNinja
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter
Phishing-Phramework
Phishing application to aid in sending emails more simply and allowing for more control over settings.
WordlistSmith
A tool to quickly scrape a website and generate a wordlist. Multithreading capable.
mattgrandy's Repositories
mattgrandy/WordlistSmith
A tool to quickly scrape a website and generate a wordlist. Multithreading capable.
mattgrandy/CredNinja
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter
mattgrandy/Phishing-Phramework
Phishing application to aid in sending emails more simply and allowing for more control over settings.
mattgrandy/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
mattgrandy/AggressorAssessor
Aggressor scripts for phases of a pen test or red team assessment
mattgrandy/Apache-Struts2-S2-045-Mass-Scanner
mattgrandy/AutoNessus
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause, and resume a scan.
mattgrandy/CIMplant
C# port of WMImplant which uses either CIM or WMI to query remote systems
mattgrandy/commando-vm
mattgrandy/Convert-Invoke-Kerberoast
Converts the output from Invoke-Kerberoast into hashcat format.
mattgrandy/CSharpScripts
Collection of C# scripts
mattgrandy/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27
mattgrandy/DirSniper
Sniping dirs since '24
mattgrandy/DocPatch
A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet.
mattgrandy/ExecuteAssembly
Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash).
mattgrandy/InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
mattgrandy/NetLoader
Loads any C# binary in mem, patching AMSI + ETW.
mattgrandy/PenTestScripts
Scripts that are useful for me on pen tests
mattgrandy/pipal
Pipal, THE password analyser
mattgrandy/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
mattgrandy/RandomScripts
Scripts for public use that we've randomly written, or have updated from other people's work.
mattgrandy/Social-Engineering-Payloads
Collection of social engineering payloads
mattgrandy/tmux-initialization
mattgrandy/WMIPersistence
WMI Event Subscription Persistence in C#