byt3bl33d3r / dnschef-ngLinks
DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts
☆161Updated last year
Alternatives and similar repositories for dnschef-ng
Users that are interested in dnschef-ng are comparing it to the libraries listed below
Sorting:
- ☆110Updated 10 months ago
- C2 Automation using Linode☆84Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- Automate converting webshells into reverse shells.☆70Updated last month
- ☆83Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- Repo for all my exploits/PoCs☆52Updated 4 months ago
- Automated exploitation of MSSQL servers at scale☆117Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 10 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 10 months ago
- ☆59Updated 10 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆66Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- POC for DLL Proxying / Hijacking☆62Updated 3 months ago
- ☆161Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 4 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆67Updated 2 weeks ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 7 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- PoC that downloads an executable from a public SSL certificate☆128Updated last month
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Updated 3 weeks ago