alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 2 weeks ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 10 months ago
- Duplicate not owned Token from Running Process☆73Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆52Updated last year
- ☆25Updated 2 years ago
- ☆91Updated 2 years ago
- ☆59Updated last year
- ☆47Updated 3 years ago
- ☆161Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Bruteforces Fortinet SSL VPNs☆57Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- Dump Windows SAM hashes☆42Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆59Updated last year
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated 2 years ago
- ☆109Updated last year
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ☆15Updated 2 years ago