djhohnstein / cliProxyLinks
Proxy Unix applications in the terminal
☆114Updated 4 years ago
Alternatives and similar repositories for cliProxy
Users that are interested in cliProxy are comparing it to the libraries listed below
Sorting:
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- ☆197Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆72Updated 7 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- ☆166Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Parse NTLM challenge messages over HTTP and SMB☆151Updated 2 years ago
- ☆170Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆175Updated 7 years ago
- ☆67Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- ☆99Updated 4 years ago
- POC for NetworkService PrivEsc☆126Updated 5 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆190Updated 4 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 5 years ago
- named pipe server with impersonation☆59Updated 6 years ago
- ☆127Updated 5 years ago
- Spray a hash via smb to check for local administrator access☆142Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 4 years ago
- ☆38Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Updated 4 years ago