Shell-Company / QRExfil
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
☆259Updated last year
Related projects: ⓘ
- ☆474Updated 5 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆301Updated 5 months ago
- ☆258Updated 3 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆322Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆339Updated 5 months ago
- ☆325Updated last year
- A RedTeam Toolkit☆377Updated 7 months ago
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆468Updated last month
- OSINT tool to crawl a site and extract useful recon info.☆174Updated 2 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆193Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆269Updated last month
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆85Updated last month
- Shodan Dorks 2023☆229Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆218Updated 3 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆327Updated 6 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- ☆426Updated this week
- NTP Exfiltration Tool☆132Updated 10 months ago
- Automate Active Directory Enumeration☆375Updated 2 weeks ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆137Updated 5 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆382Updated last month
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆236Updated last month
- Tool for hiding Kali Linux on the network☆295Updated 3 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆319Updated 2 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆475Updated last year
- ☆158Updated 2 months ago
- ☆302Updated 5 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆193Updated last month