alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆52Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- ☆59Updated 11 months ago
- Bruteforces Fortinet SSL VPNs☆57Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Dump Windows SAM hashes☆42Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆166Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆15Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- ☆91Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆35Updated 2 years ago
- ☆110Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year