EvilWhales / RProxy-LABLinks
RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools
☆48Updated last month
Alternatives and similar repositories for RProxy-LAB
Users that are interested in RProxy-LAB are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- ☆48Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- ☆55Updated 2 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Updated 2 months ago
- A command and control framework.☆54Updated last year
- ☆71Updated last month
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Updated 2 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Malware traffic obfuscation library☆39Updated 6 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Updated 6 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- ☆59Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆85Updated 2 weeks ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Updated last month
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 5 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆69Updated this week
- dump Chrome cookies remotely with atexec and CDP☆68Updated last year
- ☆27Updated 2 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆61Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago