alexdhital / Infiltrax
Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, bypass UAC and install AnyDesk for persistent remote access.
☆75Updated 6 months ago
Alternatives and similar repositories for Infiltrax:
Users that are interested in Infiltrax are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆101Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated last week
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- PowerShell Obfuscator☆115Updated 9 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆61Updated 10 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- Continuous password spraying tool☆174Updated 3 weeks ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆143Updated 9 months ago
- ☆79Updated last month
- ☆58Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- A real fake social engineering app☆98Updated 2 weeks ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆53Updated 4 months ago
- Everything and anything related to password spraying☆132Updated 10 months ago
- Our Tips&Tricks☆111Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆180Updated 7 months ago
- ☆103Updated 6 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆79Updated this week
- FindGPPPasswords, A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged…☆130Updated last month
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- ☆16Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆160Updated 3 weeks ago
- ☆38Updated 3 months ago