EvilWhales / RProxy-LABLinks
RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools
☆46Updated last month
Alternatives and similar repositories for RProxy-LAB
Users that are interested in RProxy-LAB are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- ☆48Updated last month
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆92Updated 4 months ago
- Malware traffic obfuscation library☆38Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- ☆70Updated 2 weeks ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆67Updated 2 weeks ago
- A command and control framework.☆54Updated last year
- ☆59Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆61Updated 5 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆117Updated last month
- dump Chrome cookies remotely with atexec and CDP☆68Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆50Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆54Updated 2 weeks ago
- ☆108Updated last year
- ☆57Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- AI-based implant feature☆25Updated 8 months ago
- ☆55Updated 2 months ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Updated last week
- A simple website to act as a store for havoc modules and extensions☆28Updated 11 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆53Updated 4 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆24Updated 3 weeks ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆139Updated last month
- Abusing SSRF to deliver an authenticated command injection payload☆30Updated 4 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆37Updated this week
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Updated last year