FalconOpsLLC / udpzLinks
Speedy probe-based UDP service scanner
☆89Updated 3 weeks ago
Alternatives and similar repositories for udpz
Users that are interested in udpz are comparing it to the libraries listed below
Sorting:
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆189Updated 2 weeks ago
- Active Directory Authentication Library☆77Updated last week
- A cross platform library to write offensive and defensive security tools in Go☆106Updated this week
- Execute commands interactively on remote Windows machines using the WinRM protocol☆173Updated last week
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆221Updated 2 months ago
- Generate and Manage KeyCredentialLinks☆160Updated last week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆167Updated 2 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated 2 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆193Updated 2 weeks ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆209Updated 9 months ago
- Indirect Syscall with TartarusGate Approach in Go☆124Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆68Updated 3 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆183Updated last week
- Adversary Emulation Framework☆120Updated 2 weeks ago
- Reaping treasures from strings in remote processes memory☆264Updated 5 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆194Updated last month
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆124Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆202Updated 3 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆205Updated 5 months ago
- A dirty PoC for a reverse shell with cool features in Rust☆182Updated 10 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆85Updated 2 years ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 3 months ago
- PoCs of RCEs against open source C2 servers☆86Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆268Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 4 months ago
- Enumerate Domain Users Without Authentication☆239Updated 2 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆75Updated 10 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆127Updated last year
- The Official Sliver Armory☆111Updated 3 months ago