casterbyte / Above
Invisible network protocol sniffer
☆723Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Above
- ☆493Updated 7 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆779Updated this week
- Network Pentesting Mindmap☆731Updated 2 months ago
- ☆305Updated 7 months ago
- Tool for hiding Kali Linux on the network☆296Updated 5 months ago
- A monster cheatsheet on MITM attacks☆319Updated 9 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 3 months ago
- Script for generating revshells☆454Updated 2 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆466Updated 3 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆297Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆231Updated 5 months ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆470Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆620Updated this week
- 🕸️ Crawl in the web network☆356Updated 6 months ago
- A python tool to automate KeePass discovery and secret extraction.☆451Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆283Updated last month
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆550Updated last week
- ↕️🤫 Stealth redirector for your red team operation security☆630Updated 3 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆346Updated 11 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆480Updated 5 months ago
- reverse shell using curl☆449Updated 7 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆865Updated 4 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆285Updated 10 months ago
- A RedTeam Toolkit☆385Updated 3 weeks ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆385Updated 4 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆385Updated last month
- ☆332Updated last year
- An offensive data enrichment pipeline☆615Updated 2 months ago
- Red Team Attack Lab for TTP testing & research☆560Updated last year