AmberWolfCyber / NachoVPNLinks
A delicious, but malicious SSL-VPN server ๐ฎ
โ261Updated 4 months ago
Alternatives and similar repositories for NachoVPN
Users that are interested in NachoVPN are comparing it to the libraries listed below
Sorting:
- โ163Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolโ270Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.โ264Updated 9 months ago
- Automating the MITM attack on WSUSโ297Updated last month
- Group Policy Objects manipulation and exploitation frameworkโ289Updated 2 months ago
- Python3 utility for creating zip files that smuggle additional data for later extractionโ264Updated 8 months ago
- A cross platform library to write offensive and defensive security tools in Goโ130Updated last month
- โ189Updated 2 years ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easilyโ260Updated last month
- โ306Updated 10 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.โ364Updated 5 months ago
- The different ways to dump lsassโ261Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementโ181Updated 8 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution typesโ121Updated 5 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automationโ196Updated last year
- A Rust implementation of Internal-Monologue โ retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and โฆโ191Updated 9 months ago
- An interactive shell to spoof some LOLBins command lineโ188Updated 2 years ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectiโฆโ432Updated 3 months ago
- โ378Updated 3 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blockingโ150Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such โฆโ385Updated 5 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.โ245Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraphโ290Updated 2 weeks ago
- peeko โ Browser-based XSS C2 for stealthy internal network exploration via infected browser.โ222Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingโ149Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hostsโ179Updated 8 months ago
- psexecsvc - a python implementation of PSExec's native service implementationโ235Updated 11 months ago
- โ163Updated 7 months ago
- Our Tips&Tricksโ128Updated 11 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.โ336Updated last year