a7t0fwa7 / Attacker_Infrastructure_SetupLinks
☆12Updated 6 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆23Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆72Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- ☆59Updated 11 months ago
- Tool for extracting credentials locally stored by web browsers☆34Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆18Updated last year
- ☆28Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- Cobalt Strike BOFS☆16Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- ☆22Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 8 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3☆29Updated last year