alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- PowerShell Reverse Shell☆79Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 11 months ago
- ☆52Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆171Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- ☆47Updated 3 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- ☆59Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- C2 Automation using Linode☆85Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- A small red team course☆40Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- ☆109Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆27Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago