EncodeGroup / GopherLinks
C# tool to discover low hanging fruits
☆94Updated 2 years ago
Alternatives and similar repositories for Gopher
Users that are interested in Gopher are comparing it to the libraries listed below
Sorting:
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆61Updated 5 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- python spraying tools based on impacket lib☆53Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 3 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Updated 9 months ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 3 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 3 years ago
- ☆95Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆92Updated last year
- ☆93Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- ☆89Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 4 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Exchangelib wrapper for pentesting☆64Updated 4 months ago
- Password Spraying Framework☆63Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆147Updated 3 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆102Updated 3 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆144Updated 4 years ago
- UI for creating LNKs☆104Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆144Updated 2 years ago
- ☆126Updated 2 years ago