123ojp / GREtunnel-scannerLinks
This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
☆77Updated last month
Alternatives and similar repositories for GREtunnel-scanner
Users that are interested in GREtunnel-scanner are comparing it to the libraries listed below
Sorting:
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆102Updated last month
- ☆59Updated 10 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆59Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆84Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- Validates priv escalation of AD trusts☆47Updated 6 months ago
- Tool to aid in dumping LSASS process remotely☆41Updated last week
- ☆81Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 6 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- ☆57Updated 7 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- Python tool to interact with WMI StdRegProv☆60Updated 10 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- Permanently disable EDRs as local admin☆105Updated 3 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆99Updated last year
- ZSH integration for Impacket☆72Updated 8 months ago
- ☆58Updated 11 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆44Updated last month
- ☆110Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 11 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 10 months ago
- ☆147Updated 5 months ago
- ☆44Updated 2 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 5 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆26Updated 2 weeks ago
- SAM Dumping in C#☆51Updated 8 months ago