christophetd / IPv6teal
Stealthy data exfiltration via IPv6 covert channel
☆99Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for IPv6teal
- SNIcat☆125Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- Pypykatz agent implemented in .NET☆85Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 6 years ago
- ☆98Updated 5 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- An Insider Threat Toolkit☆149Updated 5 years ago
- SMB Named Pipe shell☆63Updated 7 years ago
- A CLI tool for querying passive DNS services☆41Updated 10 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- A Django application to help red team operators manage a library of domain names☆161Updated last year
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 5 years ago
- Packet communication investigator☆90Updated last year
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- Targeted Payload Execution☆96Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆73Updated 5 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆106Updated 3 years ago
- ☆108Updated 3 years ago
- Responsive Command and Control System☆101Updated 2 years ago
- Clean public password dump files and store in ELK☆35Updated 6 years ago