JoelGMSec / Invoke-DNSteal
Simple & Customizable DNS Data Exfiltrator
☆106Updated last year
Related projects: ⓘ
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆134Updated last year
- Lookup for interesting stuff in SMB shares☆147Updated last year
- ☆95Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆251Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆186Updated 2 months ago
- Hiding GoPhish from the boys in blue☆167Updated last year
- Generate graphs and charts based on password cracking result☆152Updated last year
- msImpersonate - User account impersonation written in pure Python3☆106Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- ☆178Updated last year
- ☆121Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆162Updated last year
- ☆117Updated last year
- Modular Enumeration and Password Spraying Framework☆104Updated 5 months ago
- Password list generator for password spraying - prebaked with goodies☆93Updated last year
- A script to dump files and folders remotely from a Windows SMB share.☆204Updated 2 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆190Updated 9 months ago
- A WLAN red team framework.☆141Updated 7 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- ☆133Updated 10 months ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆142Updated last week
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Easy red team phishing with Puppeteer☆127Updated last year
- Malware vulnerability intel tool for third-party attackers.☆107Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆298Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- Basic C2 Server☆180Updated 3 years ago