blackhillsinfosec / skyhookLinks
A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
☆258Updated last year
Alternatives and similar repositories for skyhook
Users that are interested in skyhook are comparing it to the libraries listed below
Sorting:
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- ☆104Updated last year
- ☆199Updated last week
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆243Updated last year
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- ☆221Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- Continuous password spraying tool☆189Updated 3 months ago
- ☆298Updated 3 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆393Updated 3 months ago
- ☆234Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆160Updated 2 weeks ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆95Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆230Updated 4 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆230Updated last month
- Azure mindmap for penetration tests☆185Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆172Updated last year
- Collection of random RedTeam scripts.☆206Updated last year
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆188Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆259Updated last year
- User Enumeration of Microsoft Teams users via API☆159Updated last year
- Just some random Red Team Scripts that can be useful☆152Updated 11 months ago
- ☆159Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆97Updated 2 months ago