This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
☆73May 21, 2023Updated 2 years ago
Alternatives and similar repositories for Nac_Bypass_Agent
Users that are interested in Nac_Bypass_Agent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Mar 27, 2022Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ☆91Aug 5, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 4 months ago
- leaking net-ntlm with webdav☆25Feb 23, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆66Aug 31, 2024Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 4 years ago
- Collection of random RedTeam scripts.☆214Mar 8, 2024Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆598Jan 20, 2026Updated 3 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆744May 19, 2023Updated 3 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- ☆28Aug 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Click Once + App Domain☆67Feb 23, 2026Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆33Aug 16, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆141Sep 14, 2024Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆107Sep 22, 2023Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆305Oct 29, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆163Mar 1, 2024Updated 2 years ago
- RDPCredentialStealer it's an implant that steal credentials provided by users in RDP using API Hooking with Detours in C++☆265Mar 11, 2026Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆575Jun 5, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- PowerShell Script Analyzer☆68Oct 26, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆649Mar 20, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆260Nov 15, 2025Updated 6 months ago
- Simple BOF to read the protection level of a process☆122May 10, 2023Updated 3 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆187Aug 2, 2023Updated 2 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆327Mar 24, 2026Updated last month