AmberWolfCyber / NachoVPNLinks
A delicious, but malicious SSL-VPN server ๐ฎ
โ251Updated 2 weeks ago
Alternatives and similar repositories for NachoVPN
Users that are interested in NachoVPN are comparing it to the libraries listed below
Sorting:
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.โ223Updated 4 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolโ265Updated 10 months ago
- Automating the MITM attack on WSUSโ262Updated 2 months ago
- โ162Updated 4 months ago
- An interactive shell to spoof some LOLBins command lineโ186Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.โ232Updated 8 months ago
- โ303Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingโ148Updated last year
- โ188Updated last year
- โ211Updated 3 months ago
- Python3 utility for creating zip files that smuggle additional data for later extractionโ257Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.โ155Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automationโ194Updated last year
- A Rust implementation of Internal-Monologue โ retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and โฆโ168Updated 4 months ago
- Group Policy Objects manipulation and exploitation frameworkโ232Updated 3 weeks ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementโ176Updated 3 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.โ307Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.โ200Updated 2 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hostsโ165Updated 3 months ago
- Generate and Manage KeyCredentialLinksโ164Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ146Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingโ197Updated 6 months ago
- PoC that downloads an executable from a public SSL certificateโ127Updated last month
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraphโ236Updated last week
- โ156Updated 3 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and epheโฆโ232Updated 2 months ago
- โ195Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cโฆโ167Updated 11 months ago
- Continuous password spraying toolโ192Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blockingโ145Updated last year