Coalfire-Research / autorelayxView external linksLinks
Automatically perform advanced NTLM hash relay attacks
☆15Nov 4, 2022Updated 3 years ago
Alternatives and similar repositories for autorelayx
Users that are interested in autorelayx are comparing it to the libraries listed below
Sorting:
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated last month
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- VPN proxy server for nordvpn, personal internet access, windscribe☆19May 26, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆18Mar 10, 2021Updated 4 years ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆23Sep 29, 2025Updated 4 months ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Apr 17, 2020Updated 5 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆30Jul 4, 2019Updated 6 years ago
- Powershell version of SharpGPOAbuse☆90May 21, 2021Updated 4 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- 💙 tenable.sc / nessus / acas powershell module☆40Nov 30, 2021Updated 4 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- ☆10Oct 9, 2024Updated last year
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- Hyper-V Linux Guest VM Enhancements☆36Sep 16, 2021Updated 4 years ago
- Script for Local Windows Enumeration☆31Mar 12, 2018Updated 7 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago