AmberWolfCyber / NachoVPN
A delicious, but malicious SSL-VPN server 🌮
☆217Updated 4 months ago
Alternatives and similar repositories for NachoVPN:
Users that are interested in NachoVPN are comparing it to the libraries listed below
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- ☆190Updated 7 months ago
- A PowerShell console in C/C++ with all the security features disabled☆227Updated last month
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆146Updated 11 months ago
- ☆186Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆143Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- ☆170Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 9 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆190Updated 3 weeks ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆277Updated 8 months ago
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆195Updated last week
- psexecsvc - a python implementation of PSExec's native service implementation☆193Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆181Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆225Updated 3 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆190Updated 2 weeks ago
- ☆299Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆193Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆252Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆109Updated 3 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated this week
- ☆276Updated last year
- Find potential DLL Sideloads on your windows computer☆200Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆161Updated 4 months ago
- Different methods to get current username without using whoami☆174Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆198Updated 10 months ago