christophetd / IPv6teal
Stealthy data exfiltration via IPv6 covert channel
☆104Updated 5 years ago
Alternatives and similar repositories for IPv6teal:
Users that are interested in IPv6teal are comparing it to the libraries listed below
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- Automated 802.1x Bypass☆85Updated 4 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Pypykatz agent implemented in .NET☆85Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Updated 5 years ago
- ☆60Updated 4 years ago
- ☆98Updated 5 years ago
- ☆108Updated 3 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆123Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆128Updated last year
- ☆68Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆63Updated 5 years ago
- Pypykatz server☆124Updated 5 years ago
- Simulating Adversary Operations☆92Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- ☆57Updated 4 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago
- Reconnaissance tool for Microsoft Office 365☆66Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆107Updated 2 months ago