b3rito / peekoLinks
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
☆198Updated 2 months ago
Alternatives and similar repositories for peeko
Users that are interested in peeko are comparing it to the libraries listed below
Sorting:
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆231Updated 4 months ago
- Everything and anything related to password spraying☆141Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆159Updated 3 weeks ago
- A Red Team Activity Hub☆209Updated last week
- ☆199Updated 2 weeks ago
- ☆88Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆166Updated 3 weeks ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆179Updated 2 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆316Updated last month
- ☆159Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- Azure Post Exploitation Framework☆200Updated 3 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆224Updated 3 weeks ago
- C2 Infrastructure Automation☆103Updated this week
- ☆159Updated last month
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- Continuous password spraying tool☆189Updated 3 months ago
- Generate and Manage KeyCredentialLinks☆160Updated 3 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆149Updated 6 months ago
- ☆177Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆328Updated 5 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- ☆71Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆202Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- Find potential DLL Sideloads on your windows computer☆208Updated 5 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆385Updated 2 months ago