blackhillsinfosec / skyhook
A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
☆255Updated 10 months ago
Alternatives and similar repositories for skyhook:
Users that are interested in skyhook are comparing it to the libraries listed below
- ☆189Updated 5 months ago
- ☆284Updated last year
- ☆133Updated 8 months ago
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆200Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆278Updated 2 months ago
- ☆102Updated last year
- Ping-based Information Lookup and Outbound Transfer☆74Updated 10 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆185Updated 8 months ago
- Roast in the Middle☆290Updated 3 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆234Updated 11 months ago
- Malware As A Service☆132Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆254Updated 4 months ago
- Tool to remotely dump secrets from the Windows registry☆434Updated 2 weeks ago
- ☆274Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆350Updated last month
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated this week
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆286Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆177Updated 11 months ago
- Find potential DLL Sideloads on your windows computer☆176Updated 2 months ago
- Cortex XDR Config Extractor☆131Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆457Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆320Updated last year
- Make everyone in your VLAN ASRep roastable☆184Updated 2 weeks ago
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆384Updated 11 months ago