Slowerzs / ThievingFox
☆531Updated 11 months ago
Alternatives and similar repositories for ThievingFox:
Users that are interested in ThievingFox are comparing it to the libraries listed below
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆562Updated 8 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆510Updated 7 months ago
- ☆258Updated last week
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆350Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆366Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆401Updated this week
- Tool to remotely dump secrets from the Windows registry☆434Updated 2 weeks ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆372Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆351Updated 11 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆528Updated 3 months ago
- ☆284Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆507Updated 7 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆663Updated 7 months ago
- yet another AV killer tool using BYOVD☆266Updated last year
- ☆297Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…