EvilWhales / VPN-BlackBox-CheckerLinks
A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, without accounts, without IP sheets).
☆29Updated 2 months ago
Alternatives and similar repositories for VPN-BlackBox-Checker
Users that are interested in VPN-BlackBox-Checker are comparing it to the libraries listed below
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Updated last month
- ☆55Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Updated 3 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Updated 7 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆79Updated 2 months ago
- This C# tool sprays for admin access over the entire domain☆87Updated 2 months ago
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- Proof of concept for Kerberos Armoring abuse.☆78Updated 2 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆61Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Updated 3 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆183Updated last month
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- ☆71Updated last month
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆152Updated last week
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated last month
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Updated last month
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Updated 2 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Updated 2 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 3 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆76Updated this week
- A Windows tool that converts LDIF files to BloodHound CE☆25Updated last month
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆69Updated this week