Aetsu / Neton
Neton is a tool for getting information from Internet connected sandboxes
☆92Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Neton
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆91Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆151Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆133Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆52Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆38Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆60Updated 6 months ago
- AV/EDR evasion via direct system calls.☆106Updated 11 months ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆53Updated 7 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆41Updated 8 months ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆46Updated 9 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆40Updated 6 months ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆60Updated 3 years ago
- ☆51Updated 2 years ago
- TeamServer and Client of Exploration Command and Control Framework☆68Updated this week
- ☆238Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆42Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆35Updated 2 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆147Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆75Updated last year