alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Lateral Movement☆123Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆47Updated 3 years ago
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated 11 months ago
- ☆27Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆124Updated 3 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆201Updated 3 months ago
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- Dump Windows SAM hashes☆42Updated last year
- ☆51Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 7 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- C# havoc implant☆99Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- ☆85Updated 3 months ago