Krypteria / Ant
Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configuration file. It offers support for remote execution using protocols such as WMI, WinRM, and SMB.
☆14Updated last year
Alternatives and similar repositories for Ant:
Users that are interested in Ant are comparing it to the libraries listed below
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆13Updated 2 months ago
- Cobalt Strike BOFS☆15Updated last year
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆24Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆27Updated last week
- x86_64 LKM linux rootkit☆16Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- ☆51Updated 3 months ago
- Windows priviledge escalation script☆13Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- ☆17Updated 3 months ago
- A user enumeration tool for Slack.☆26Updated 9 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated last week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated last week
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- A small red team course☆37Updated last year
- ☆28Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- AV/EDR companies netblocks☆16Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 4 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year