Arno0x / DNSExfiltrator
Data exfiltration over DNS request covert channel
☆842Updated 4 months ago
Related projects: ⓘ
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,210Updated 2 years ago
- A Python Package for Data Exfiltration☆754Updated 4 months ago
- pwning IPv4 via IPv6☆1,675Updated 7 months ago
- HTA encryption tool for RedTeams☆1,362Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆510Updated 3 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,783Updated 2 weeks ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,376Updated 5 years ago
- A tool to abuse Exchange services☆2,151Updated 3 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,500Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,095Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆571Updated 3 months ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,289Updated 3 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,118Updated 3 years ago
- Windows Event Log Killer☆1,742Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,443Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,386Updated last year
- 🕳 godoh - A DNS-over-HTTPS C2☆746Updated 9 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,173Updated 9 months ago
- PowerShell Pass The Hash Utils☆1,460Updated 5 years ago
- PowerShell ReverseTCP Shell - Framework☆1,034Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,024Updated 2 years ago
- ☆2,037Updated this week
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆650Updated 10 months ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,201Updated last year
- A collection of Red Team focused tools, scripts, and notes☆1,105Updated 4 years ago
- Easy files and payloads delivery over DNS☆410Updated 5 months ago
- Responder Windows Version Beta☆493Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,234Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,494Updated last month
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆529Updated 6 months ago