alperenugurlu / Nac_Bypass_AgentLinks
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
Sorting:
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- A C2 framework built for my bachelors thesis☆56Updated last week
- Duplicate not owned Token from Running Process☆73Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- ☆59Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- ☆52Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 10 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- Automated exploitation of MSSQL servers at scale☆128Updated 2 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆50Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- ☆47Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 8 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- ☆27Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year