4 tools and resources
A post-exploitation framework for attacking running AWS infrastructure
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Automated tool for scripting complex sequences in cybersecurity frameworks.
Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.