djhohnstein / cliProxyLinks
Proxy Unix applications in the terminal
☆116Updated 4 years ago
Alternatives and similar repositories for cliProxy
Users that are interested in cliProxy are comparing it to the libraries listed below
Sorting:
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆73Updated 7 years ago
- ☆198Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- ☆38Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- Parse NTLM challenge messages over HTTP and SMB☆150Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- ☆66Updated 2 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- POC for NetworkService PrivEsc☆129Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- ☆167Updated 3 years ago
- MSBuild without MSbuild.exe☆135Updated 5 years ago
- Malleable C2 profiles for Cobalt Strike☆75Updated 3 years ago
- Exchangelib wrapper for pentesting☆67Updated 11 months ago
- Code Exec via Excel☆88Updated 8 years ago
- ☆72Updated 3 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- ☆99Updated 4 years ago
- ☆127Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆138Updated last year
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- ☆170Updated 4 years ago