D00Movenok / BounceBackLinks
βοΈπ€« Stealth redirector for your red team operation security
β700Updated last month
Alternatives and similar repositories for BounceBack
Users that are interested in BounceBack are comparing it to the libraries listed below
Sorting:
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ607Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.β526Updated 3 months ago
- Windows remote execution multitoolβ648Updated last month
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanceβ¦β551Updated 2 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).β573Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSβ¦β431Updated 11 months ago
- 𦫠| GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specificβ¦β575Updated 3 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11β548Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.β435Updated 9 months ago
- Useful C2 techniques and cheatsheets learned from engagementsβ535Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ607Updated 3 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation inβ¦β514Updated last year
- β712Updated last year
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native execβ¦β352Updated 3 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection sβ¦β388Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ727Updated 2 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.β436Updated last year
- HookChain: A new perspective for Bypassing EDR Solutionsβ555Updated 7 months ago
- Real fucking shellcode encryptor & obfuscator toolβ928Updated last month
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).β442Updated 2 years ago
- A command and control framework written in rust.β358Updated 5 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundβ588Updated 8 months ago
- Just another Powerview alternative but on steroidsβ762Updated this week
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.β468Updated 2 months ago
- UAC Bypass By Abusing Kerberos Ticketsβ499Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberosβ397Updated last year
- Tool to remotely dump secrets from the Windows registryβ476Updated 2 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ719Updated last year
- Shellcode loader generator with multiples featuresβ491Updated 7 months ago
- Simulate the behavior of AV/EDR for malware development training.β532Updated last year