MrAle98 / chiselLinks
A fast TCP/UDP tunnel over HTTP
☆23Updated 10 months ago
Alternatives and similar repositories for chisel
Users that are interested in chisel are comparing it to the libraries listed below
Sorting:
- ☆214Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 weeks ago
- Library of BOFs to interact with SQL servers☆210Updated last week
- ☆228Updated last year
- ☆196Updated 7 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆140Updated last year
- ☆146Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆163Updated 2 months ago
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆129Updated 4 months ago
- Local SYSTEM auth trigger for relaying☆166Updated 4 months ago
- My implementation of the GIUDA project in C++☆187Updated 2 years ago
- Havoc C2 profile generator☆99Updated 4 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 8 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆174Updated 2 weeks ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆337Updated last year
- ☆233Updated last year
- ☆29Updated last year
- Lateral movement with DCOM DLL hijacking☆167Updated 4 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆141Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆209Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆56Updated last month
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 5 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆284Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆129Updated 3 years ago
- ☆120Updated 9 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆284Updated 7 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- ☆101Updated 2 years ago
- Adversary Emulation Framework☆126Updated 4 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆205Updated last year