djhohnstein / cliProxyLinks
Proxy Unix applications in the terminal
☆116Updated 4 years ago
Alternatives and similar repositories for cliProxy
Users that are interested in cliProxy are comparing it to the libraries listed below
Sorting:
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- ☆168Updated 3 years ago
- Python api for usage with cobalt strike's External C2 specification☆73Updated 7 years ago
- ☆198Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆192Updated 4 years ago
- POC for NetworkService PrivEsc☆126Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆148Updated 3 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- ☆38Updated 5 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆170Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 6 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆189Updated 2 years ago
- MSBuild without MSbuild.exe☆134Updated 4 years ago
- ☆71Updated 3 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- ☆66Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- ☆127Updated 5 years ago
- ☆99Updated 4 years ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Updated 5 years ago