airbus-seclab / soxyLinks
A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.
☆249Updated this week
Alternatives and similar repositories for soxy
Users that are interested in soxy are comparing it to the libraries listed below
Sorting:
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆369Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- Reaping treasures from strings in remote processes memory☆262Updated 4 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆229Updated 5 months ago
- Tool for viewing NTDS.dit☆168Updated 3 months ago
- A PowerShell console in C/C++ with all the security features disabled☆252Updated last month
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- ☆199Updated last week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- Generate and Manage KeyCredentialLinks☆160Updated 2 weeks ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆259Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆243Updated 5 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆211Updated last month
- Stage 0☆161Updated 6 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆89Updated last month
- ☆188Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆233Updated last week
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆221Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆336Updated 2 months ago
- Tools for analyzing EDR agents☆230Updated last year
- ☆221Updated last year
- My implementation of the GIUDA project in C++☆184Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆292Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆229Updated 2 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆201Updated 4 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆153Updated 6 months ago
- Find potential DLL Sideloads on your windows computer☆208Updated 5 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 6 months ago
- Recovering NTLM hashes from Credential Guard☆339Updated 2 years ago