alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Lateral Movement☆124Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆47Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- ☆51Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Azure Service Subdomain Enumeration☆61Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- ☆88Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆59Updated 8 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 5 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆199Updated last year
- ☆93Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Dump Windows SAM hashes☆42Updated last year
- A small red team course☆40Updated 2 years ago