coryschwartz / dns_exfiltration
Simple DNS exfiltration using base64-encoded URL's
☆14Updated 7 years ago
Alternatives and similar repositories for dns_exfiltration:
Users that are interested in dns_exfiltration are comparing it to the libraries listed below
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆16Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- ☆11Updated 7 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Nessus Vulnerability visualization for the web☆30Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated 11 months ago
- SilkETW & SilkService☆40Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- ☆12Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- AYY LMAO☆21Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- ☆16Updated 10 years ago