GhostWolfLab / GhostADLinks
轻量级的 Active Directory 枚举工具,用于收集域环境中的信息
☆88Updated 7 months ago
Alternatives and similar repositories for GhostAD
Users that are interested in GhostAD are comparing it to the libraries listed below
Sorting:
- eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。☆64Updated last year
- 绕过杀软dumphash 离线读取☆149Updated 11 months ago
- 一款简单的后渗透免杀加载器,Bypass AV/EDR☆82Updated last year
- ConvertiX, 一款将常用网络空间测绘平台语句之间互相转换的工具。☆52Updated 2 months ago
- 使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术☆123Updated 9 months ago
- 一套标准化的数字取证与应急响应信息采集规则格式规范。☆36Updated 3 months ago
- 本项目是基于Neo-reGeorg进行二次开发,对PHP木马添加了AES加密,修改了请求体和响应体特征☆90Updated last year
- EWSTool是一 个针对EXCHANGE邮件服务器的后渗透利用工具。使用ews接口,实现人员邮箱列表获取、搜索邮件、下载邮件等实用功能。☆61Updated 7 months ago
- PHP代码审计案例-1000PHP☆27Updated last year
- 集成了截图 键盘记录 剪贴版功能,用于网络限制场景下的信息搜集☆87Updated last year
- nim免杀过某数字、某绒☆63Updated last year
- Exchange 信息收集工具☆53Updated 9 months ago
- AI 生成☆46Updated 3 months ago
- 利用Rust编写的高效URL测活工具,主要特点快速、批量、轻量,支持异步☆67Updated last month
- 电子书籍-代码审计-域渗透(内网思路)-免杀-云安全☆47Updated last year
- 基于Go开发检索windows进程字符串工具☆78Updated last year
- pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具☆48Updated 11 months ago
- Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)☆103Updated 2 years ago
- Pangolin is developed using Go and Fyne, currently focusing on proximity-based internal network penetration testing for mobile platforms�…☆33Updated 11 months ago
- Cobalt Strike插件☆94Updated last year
- ShellCode_Loader - CobaltStrike免杀ShellCode加载器、免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender,请参考博客 https://www.vpss.cc/471.html☆54Updated last year
- AutoGeaconC2: 一键读取Profile自动化生成geacon实现跨平台上线CobaltStrike☆142Updated last year
- nano nuclei engine. no side effect.☆79Updated last month
- 一款linux 内网渗透辅助工具☆78Updated last year
- xiebroC2 plugin☆56Updated 8 months ago
- Exchange 用户名爆破☆37Updated 9 months ago
- 绕过defender的完整项目☆34Updated last year
- cobaltstrike 实战案例, 含20个实战案例。插件 包在releases中☆35Updated 2 years ago
- proxy/tunnel everything for red team!☆210Updated 5 months ago
- CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839☆61Updated last year