alperenugurlu / Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆72Updated last year
Alternatives and similar repositories for Nac_Bypass_Agent:
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆14Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- ☆54Updated 4 months ago
- ☆93Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆64Updated 9 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆83Updated this week
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Lateral Movement☆122Updated last year
- A small red team course☆36Updated last year
- ☆58Updated 5 months ago
- ☆106Updated 4 months ago
- ☆51Updated last year
- ☆47Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆83Updated 2 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆68Updated last year
- Repo for all my exploits/PoCs☆50Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆79Updated 6 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year