RedTeamPentesting / kbtlsLinks
Establishes mutually trusted TLS connections based on a pre-shared connection key.
☆50Updated last year
Alternatives and similar repositories for kbtls
Users that are interested in kbtls are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 5 months ago
- ☆52Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- ☆31Updated 2 years ago
- Discord C2 Profile for Mythic☆31Updated 5 months ago
- ☆44Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆13Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Covert data exfiltration via DNS☆47Updated 6 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 4 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Validates priv escalation of AD trusts☆46Updated 4 months ago
- Java archive implant toolkit.☆61Updated 3 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- ☆17Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago
- ☆54Updated 7 months ago
- Source code and examples for PassiveAggression☆63Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago