A fast TCP/UDP tunnel over HTTP
☆23Jan 9, 2025Updated last year
Alternatives and similar repositories for chisel
Users that are interested in chisel are comparing it to the libraries listed below
Sorting:
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- ☆20Sep 6, 2025Updated 5 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- ☆13Mar 3, 2025Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)☆14Jun 11, 2023Updated 2 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last week
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆54Feb 20, 2026Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆27Feb 27, 2025Updated last year
- A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.☆21May 4, 2023Updated 2 years ago
- A Python gRPC Client Library for Sliver☆80Apr 11, 2025Updated 10 months ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆387Feb 23, 2024Updated 2 years ago
- MLOps Attack Toolkit☆29Aug 25, 2025Updated 6 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Mar 23, 2023Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆30Feb 11, 2025Updated last year
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- ACL Viewer for Windows☆133May 4, 2025Updated 9 months ago
- ☆41Feb 20, 2025Updated last year
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Mar 2, 2025Updated 11 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- The God Name Server☆36Feb 9, 2026Updated 2 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 3 months ago
- ☆159Apr 17, 2024Updated last year