alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆72Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆81Updated last year
- PowerShell Reverse Shell☆61Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- ☆51Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆93Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆64Updated 9 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Lateral Movement☆122Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Dump Windows SAM hashes☆42Updated last year
- ☆83Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- ☆47Updated 2 years ago
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆83Updated this week
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆54Updated 4 months ago
- My Favorite Offensive Security Scripts☆69Updated last year
- ☆69Updated 11 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago