a7t0fwa7 / Attacker_Infrastructure_SetupLinks
☆12Updated 4 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆59Updated last year
- ☆29Updated last year
- Cobalt Strike BOFS☆16Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆23Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 7 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆25Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 10 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆40Updated 5 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- ECC Public Key Cryptography☆39Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 5 months ago
- P2P Communications of Named Pipes☆11Updated 6 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 5 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆39Updated 6 months ago
- ☆35Updated last year