blackhillsinfosec / skyhookLinks
A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
☆268Updated last year
Alternatives and similar repositories for skyhook
Users that are interested in skyhook are comparing it to the libraries listed below
Sorting:
- ☆105Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- ☆305Updated 9 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- ☆99Updated 3 months ago
- Ping-based Information Lookup and Outbound Transfer☆80Updated last year
- Malware As A Service☆135Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆106Updated 2 years ago
- Collection of random RedTeam scripts.☆208Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆116Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆164Updated last year
- A Red Team Activity Hub☆235Updated 2 weeks ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆217Updated 2 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆254Updated last month
- Azure mindmap for penetration tests☆192Updated 2 years ago
- ☆154Updated 9 months ago
- Continuous password spraying tool☆198Updated last month
- ☆229Updated 6 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Generate and Manage KeyCredentialLinks☆180Updated 2 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 5 months ago
- Identifies the bytes that Microsoft Defender flags on.☆100Updated 3 years ago