alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Dump Windows SAM hashes☆42Updated last year
- Lateral Movement☆124Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 9 months ago
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆71Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Automated exploitation of MSSQL servers at scale☆109Updated 3 weeks ago
- ☆51Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- ☆89Updated 5 months ago
- ☆57Updated 7 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 3 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 5 months ago
- ☆73Updated 2 months ago
- ☆159Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 5 months ago
- .bin file to shellcode convertor☆38Updated last year