alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- PowerShell Reverse Shell☆61Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated 11 months ago
- Inject RDPThief into memory with PowerShell.☆58Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆60Updated 7 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- ☆26Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- Lateral Movement☆122Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆160Updated last year
- ☆51Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 4 months ago
- ☆92Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- Dump Windows SAM hashes☆41Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆181Updated last week
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 11 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆79Updated last year
- Most Responder's configuration power in your hand.☆40Updated 10 months ago