0xTriboulet / OffensiveRust
Rust Weaponization for Red Team Engagements.
☆27Updated 2 years ago
Alternatives and similar repositories for OffensiveRust
Users that are interested in OffensiveRust are comparing it to the libraries listed below
Sorting:
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- POC for DLL Proxying / Hijacking☆60Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last month
- C2 Automation using Linode☆82Updated 2 years ago
- Repo for all my exploits/PoCs☆50Updated last week
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 9 months ago
- ☆58Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated 2 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated 10 months ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated 10 months ago