byt3bl33d3r / dnschef-ngLinks
DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts
☆157Updated last year
Alternatives and similar repositories for dnschef-ng
Users that are interested in dnschef-ng are comparing it to the libraries listed below
Sorting:
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- ☆221Updated last year
- Buggy script to play with GPOs☆102Updated 6 months ago
- ☆109Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆283Updated 5 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- ☆182Updated 7 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆112Updated 2 years ago
- ☆159Updated last year
- The Official Sliver Armory☆109Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- ☆90Updated 4 months ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆51Updated this week
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆126Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- ☆70Updated last month
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆126Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆232Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆310Updated 7 months ago
- ☆201Updated 2 weeks ago
- ☆164Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year