blackhillsinfosec / skyhook
A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
☆255Updated 11 months ago
Alternatives and similar repositories for skyhook:
Users that are interested in skyhook are comparing it to the libraries listed below
- Azure mindmap for penetration tests☆184Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Easy red team phishing with Puppeteer☆129Updated 2 years ago
- ☆104Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated 3 months ago
- Everything and anything related to password spraying☆134Updated 11 months ago
- ☆191Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆156Updated 3 weeks ago
- C2 Automation using Linode☆80Updated 2 years ago
- ☆298Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 7 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆300Updated 6 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆187Updated 7 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆210Updated 4 months ago
- Azure DevOps Services Attack Toolkit☆290Updated last month
- Scan vulnerable drivers on Windows with loldrivers.io☆177Updated last year
- User Enumeration of Microsoft Teams users via API☆156Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆280Updated 4 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆352Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆254Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆384Updated last month
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆329Updated 3 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 5 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆183Updated last year
- ☆157Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆141Updated last month