b3rito / peekoLinks
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
☆220Updated 8 months ago
Alternatives and similar repositories for peeko
Users that are interested in peeko are comparing it to the libraries listed below
Sorting:
- ☆161Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆173Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆257Updated 10 months ago
- Everything and anything related to password spraying☆151Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- ☆163Updated last month
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆203Updated 11 months ago
- Continuous password spraying tool☆198Updated 3 weeks ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆252Updated 6 months ago
- A Red Team Activity Hub☆236Updated last week
- psexecsvc - a python implementation of PSExec's native service implementation☆229Updated 10 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆214Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆211Updated 5 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆258Updated 7 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆399Updated 5 months ago
- Python based GUI for browsing LDAP☆175Updated 2 weeks ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆306Updated 4 months ago
- Different methods to get current username without using whoami☆183Updated last year
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆272Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 6 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- ☆304Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆180Updated 2 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆269Updated last year