annmuor / zn2021_8ways
Examples repo for my "8 ways to spy your consoles" talk @ ZeroNights 2021
☆11Updated 3 years ago
Alternatives and similar repositories for zn2021_8ways:
Users that are interested in zn2021_8ways are comparing it to the libraries listed below
- NTLMRelay for MS Exchange☆11Updated 6 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- ☆50Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 4 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- parsers to make life easier☆12Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- Abusing SketchUp to make persistence on Windows☆21Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- ☆27Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- Group Policy Hijacking☆31Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago