D00Movenok / BounceBackLinks
βοΈπ€« Stealth redirector for your red team operation security
β709Updated last month
Alternatives and similar repositories for BounceBack
Users that are interested in BounceBack are comparing it to the libraries listed below
Sorting:
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ607Updated last year
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β585Updated 4 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.β527Updated 4 months ago
- Windows remote execution multitoolβ670Updated this week
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanceβ¦β552Updated 3 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSβ¦β438Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation inβ¦β513Updated last year
- Useful C2 techniques and cheatsheets learned from engagementsβ542Updated 2 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).β576Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ612Updated 3 months ago
- β714Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ932Updated 2 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11β547Updated last year
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native execβ¦β360Updated 4 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.β444Updated 9 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ728Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundβ595Updated 9 months ago
- A command and control framework written in rust.β362Updated this week
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection sβ¦β396Updated last year
- HookChain: A new perspective for Bypassing EDR Solutionsβ562Updated 7 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β436Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ719Updated 2 years ago
- Tool to remotely dump secrets from the Windows registryβ480Updated 2 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.β481Updated 3 months ago
- HVNC for Cobalt Strikeβ1,256Updated last year
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).β443Updated 2 years ago
- Multiplayer pivoting solutionβ415Updated 3 weeks ago
- Materials for the workshop "Red Team Ops: Havoc 101"β385Updated 10 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxyβ456Updated last year
- Shellcode loader generator with multiples featuresβ492Updated 8 months ago