Krypteria / AntLinks
Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configuration file. It offers support for remote execution using protocols such as WMI, WinRM, and SMB.
☆17Updated last year
Alternatives and similar repositories for Ant
Users that are interested in Ant are comparing it to the libraries listed below
Sorting:
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Automate converting webshells into reverse shells.☆71Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated 2 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- ☆55Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated 3 weeks ago
- Tool for extracting credentials locally stored by web browsers☆36Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆17Updated 9 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated last month
- Golang CLI binary used for installing and managing Ghostwriter☆19Updated last month
- ☆14Updated last year
- A collection of PoCs for different injection techniques on Windows!☆48Updated 2 years ago
- ☆49Updated 2 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated this week
- C2 Automation using Linode☆85Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆39Updated 3 years ago
- Right-To-Left Override POC☆36Updated 3 years ago