airbus-seclab / soxyLinks
A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.
☆258Updated last month
Alternatives and similar repositories for soxy
Users that are interested in soxy are comparing it to the libraries listed below
Sorting:
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆229Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆226Updated 3 months ago
- Tool for viewing NTDS.dit☆174Updated 4 months ago
- Automating the MITM attack on WSUS☆257Updated 3 weeks ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆297Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆206Updated 5 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆261Updated 8 months ago
- ☆203Updated last month
- A PowerShell console in C/C++ with all the security features disabled☆265Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆265Updated 5 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆129Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆299Updated 11 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆374Updated 7 months ago
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆175Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆210Updated last month
- Enumerate Domain Users Without Authentication☆253Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆107Updated this week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆167Updated 3 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆199Updated last month
- Active Directory Authentication Library☆78Updated 2 weeks ago
- ☆188Updated 4 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆188Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆159Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆189Updated 8 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆197Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆204Updated 9 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆89Updated last month
- Extracting NetNTLM without touching lsass.exe☆239Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆157Updated 7 months ago