alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- ☆51Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- ☆57Updated 8 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Dump Windows SAM hashes☆42Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 5 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 10 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆70Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆112Updated this week
- RegStrike is a .reg payload generator☆58Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- ☆26Updated 2 years ago
- Bruteforces Fortinet SSL VPNs☆57Updated last year
- Lateral Movement☆124Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆159Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆109Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago