alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Lateral Movement☆122Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Dump Windows SAM hashes☆41Updated last year
- ☆54Updated 3 months ago
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆59Updated 3 weeks ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆62Updated 8 months ago
- Continuous password spraying tool☆126Updated this week
- exfiltration/infiltration toolkit☆23Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆64Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 5 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated last week
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆89Updated last year
- ☆57Updated 10 months ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- C# havoc implant☆97Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- ☆14Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago