alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆59Updated 10 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆52Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- ☆47Updated 3 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Automated exploitation of MSSQL servers at scale☆118Updated 2 weeks ago
- exfiltration/infiltration toolkit☆24Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆35Updated 2 years ago
- A small red team course☆39Updated 2 years ago
- ☆92Updated 2 years ago
- ☆27Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ☆110Updated 10 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year