EvilWhales / VPN-BlackBox-CheckerLinks
A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, without accounts, without IP sheets).
☆29Updated last month
Alternatives and similar repositories for VPN-BlackBox-Checker
Users that are interested in VPN-BlackBox-Checker are comparing it to the libraries listed below
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Updated 3 weeks ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆160Updated 3 months ago
- This C# tool sprays for admin access over the entire domain☆87Updated last month
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆149Updated last week
- A portable C# utility for enumerating local and remote windows sessions☆54Updated 2 weeks ago
- Proof of concept for Kerberos Armoring abuse.☆58Updated last month
- ☆70Updated 2 weeks ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Updated 2 months ago
- ☆36Updated 6 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Updated last month
- Execute shellcode via ASPNET compiler☆60Updated 3 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆139Updated last month
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Updated 9 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 4 months ago
- ☆26Updated 5 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆63Updated 2 months ago
- Create, delete or list Shadows Copies using the VSS API using C++, C# or Python. Working on Windows 11☆46Updated last week
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆98Updated last week
- ☆57Updated 6 months ago
- ☆55Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆99Updated 2 weeks ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆95Updated 3 weeks ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Permanently disable EDRs as local admin☆124Updated last month
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 6 months ago