AmberWolfCyber / NachoVPNLinks
A delicious, but malicious SSL-VPN server ๐ฎ
โ252Updated 3 weeks ago
Alternatives and similar repositories for NachoVPN
Users that are interested in NachoVPN are comparing it to the libraries listed below
Sorting:
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.โ247Updated 5 months ago
- โ164Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolโ266Updated 11 months ago
- Python3 utility for creating zip files that smuggle additional data for later extractionโ260Updated 5 months ago
- Group Policy Objects manipulation and exploitation frameworkโ263Updated 2 weeks ago
- PoC that downloads an executable from a public SSL certificateโ127Updated 2 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.โ333Updated last month
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraphโ255Updated last week
- โ211Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementโ177Updated 5 months ago
- An interactive shell to spoof some LOLBins command lineโ186Updated last year
- โ305Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays โ all in a single command (14 output formats supporteโฆโ174Updated last month
- โ189Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.โ236Updated last week
- โ336Updated last week
- A Rust implementation of Internal-Monologue โ retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and โฆโ166Updated 5 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automationโ194Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such โฆโ330Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.โ204Updated 3 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingโ148Updated last year
- Python based GUI for browsing LDAPโ167Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and epheโฆโ355Updated 3 weeks ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-natโฆโ249Updated 6 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.โ238Updated 3 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingโ203Updated 7 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.โ312Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ147Updated last year
- Automating the MITM attack on WSUSโ274Updated 2 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementationโ217Updated 8 months ago