AmberWolfCyber / NachoVPNLinks
A delicious, but malicious SSL-VPN server 🌮
☆241Updated this week
Alternatives and similar repositories for NachoVPN
Users that are interested in NachoVPN are comparing it to the libraries listed below
Sorting:
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆212Updated 3 months ago
- ☆163Updated 3 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆261Updated 8 months ago
- Automating the MITM attack on WSUS☆257Updated 3 weeks ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆248Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- ☆188Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆190Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆229Updated 7 months ago
- ☆203Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆188Updated 3 weeks ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- ☆300Updated 4 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆206Updated 5 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 4 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆210Updated last month
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆154Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆161Updated 2 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆91Updated last year
- ☆282Updated 2 years ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆203Updated 3 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆144Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆70Updated 4 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆237Updated 2 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆258Updated last year