Acebond / ReverseSocks5Links
Single executable reverse SOCKS5 proxy written in Golang.
☆137Updated 6 months ago
Alternatives and similar repositories for ReverseSocks5
Users that are interested in ReverseSocks5 are comparing it to the libraries listed below
Sorting:
- Execute commands in other Sessions☆90Updated 11 months ago
- Abuse leaked token handles.☆132Updated last year
- To audit the security of read-only domain controllers☆117Updated last year
- Library of BOFs to interact with SQL servers☆189Updated 3 months ago
- A C# port from Invoke-GhostTask☆117Updated last year
- ☆142Updated 2 years ago
- ☆88Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- ☆81Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆115Updated 3 years ago
- ☆90Updated last year
- ☆127Updated 2 years ago
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆103Updated last week
- My implementation of the GIUDA project in C++☆185Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- ☆229Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆116Updated 10 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 3 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆131Updated 2 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆271Updated 2 years ago
- ☆158Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆78Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated 8 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- A collection of (even more) alternative shellcode callback methods in CSharp☆74Updated 8 months ago
- ☆100Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated this week
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago