airbus-seclab / soxyLinks
A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.
☆249Updated 2 weeks ago
Alternatives and similar repositories for soxy
Users that are interested in soxy are comparing it to the libraries listed below
Sorting:
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆228Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆261Updated 8 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆221Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆264Updated 5 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆294Updated 11 months ago
- ☆201Updated last month
- Automating the MITM attack on WSUS☆226Updated 2 weeks ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 2 months ago
- A PowerShell console in C/C++ with all the security features disabled☆256Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆336Updated 3 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆370Updated 7 months ago
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- ☆189Updated last year
- Tool for viewing NTDS.dit☆173Updated 3 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆255Updated 2 weeks ago
- ☆221Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆204Updated 5 months ago
- A cross platform library to write offensive and defensive security tools in Go☆105Updated last week
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆198Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 7 months ago
- Enumerate Domain Users Without Authentication☆239Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆165Updated last week
- Tools for analyzing EDR agents☆232Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆258Updated last week
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆322Updated 9 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆156Updated 6 months ago
- ☆180Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆154Updated last week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆138Updated last week
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆202Updated last year