Outflank B.V.
- Amsterdam, Netherlands, EU
- http://www.outflank.nl
- info@outflank.nl
Grow your team on GitHub
GitHub is home to over 50 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
Sign upRepositories
-
RedELK
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
-
EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
-
Ps-Tools
Ps-Tools, an advanced process monitoring toolkit for offensive operations
-
RedFile
Serving files with conditions, serverside keying and more.
-
TamperETW
PoC to demonstrate how CLR ETW events can be tampered.
-
Spray-AD
A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.
-
Scripts
Small scripts that make life better
-
Zipper
Zipper, a CobaltStrike file and folder compression utility.
-
Net-GPPPassword
.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
-
SharpHide
Tool to create hidden registry keys.
-
Recon-AD
Recon-AD, an AD recon tool based on ADSI and reflective DLL’s
-
Invoke-Templator
A PowerShell script to parse the docx/docm file format and update the template location.
-
Dumpert
LSASS memory dumper using direct system calls and API unhooking.
-
Excel4-DCOM
PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)
-
Invoke-ADLabDeployer
Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.
-
PasswordDump2ELK
Clean public password dump files and store in ELK
-
external_c2
POC for Cobalt Strike external C2
-
Exploits
Exploits developped by Outflank B.V. team members
-
NetshHelperBeacon
Example DLL to load from Windows NetShell