alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 10 months ago
- ☆62Updated 10 months ago
- Inject RDPThief into memory with PowerShell.☆61Updated last month
- ☆54Updated 3 months ago
- Lateral Movement☆123Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- My Favorite Offensive Security Scripts☆67Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆93Updated last year
- Dump Windows SAM hashes☆41Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- ☆16Updated 10 months ago
- ☆47Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆79Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- ☆93Updated last year
- ☆105Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆63Updated 8 months ago