byt3bl33d3r / dnschef-ng
DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts
☆135Updated last year
Alternatives and similar repositories for dnschef-ng:
Users that are interested in dnschef-ng are comparing it to the libraries listed below
- ☆105Updated 3 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated 10 months ago
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆272Updated last month
- Easy red team phishing with Puppeteer☆127Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆273Updated 3 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆119Updated 10 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated last month
- Repo for all my exploits/PoCs☆37Updated this week
- ☆85Updated last week
- Generate graphs and charts based on password cracking result☆156Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 2 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 4 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆135Updated 6 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆163Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- ☆113Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- ☆147Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- A Red Team Activity Hub☆190Updated this week
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- PowerShell Reverse Shell☆61Updated last year