b3rito / peeko
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
☆42Updated this week
Alternatives and similar repositories for peeko:
Users that are interested in peeko are comparing it to the libraries listed below
- Situational Awareness script to identify how and where to run implants☆49Updated 4 months ago
- ☆54Updated 4 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- A Moodle Scanner☆40Updated 4 months ago
- Recon scripts for Red Team and Web blackbox auditing☆23Updated last month
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Deploy a phishing infrastructure on the fly.☆68Updated 3 months ago
- ☆83Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 4 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- An easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆59Updated last week
- Windows Administrator level Implant.☆49Updated 6 months ago
- PowerShell Reverse Shell☆61Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated this week
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- ☆54Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆72Updated last month
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆54Updated 5 months ago