a7t0fwa7 / Attacker_Infrastructure_SetupLinks
☆13Updated 8 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOFS☆16Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Tests with Network Providers DLLs, adding some extra functionality to NPPSpy2 by @gtworek☆9Updated 7 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated 11 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆32Updated last year
- ☆59Updated last year
- ☆27Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- Slides and videos from talks given at cons☆25Updated 5 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆25Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated 2 years ago
- ☆22Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 10 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year