JamesCullum / CloudflaredRAT
CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an executable, to create a persistent internet-facing encrypted web shell for remote access.
☆14Updated 4 years ago
Alternatives and similar repositories for CloudflaredRAT:
Users that are interested in CloudflaredRAT are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- Citrix Phishlet☆22Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- Command and Control Framework☆14Updated 9 months ago
- Custom pentesting tools☆24Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- ☆17Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆32Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- ☆16Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated 11 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆13Updated 5 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago