djhohnstein / cliProxy
Proxy Unix applications in the terminal
☆113Updated 3 years ago
Alternatives and similar repositories for cliProxy:
Users that are interested in cliProxy are comparing it to the libraries listed below
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- ☆189Updated 4 years ago
- ☆162Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆126Updated 7 months ago
- Parse NTLM challenge messages over HTTP and SMB☆143Updated 2 years ago
- CobaltStrike External C2 for Websockets☆194Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆267Updated last year
- Cobalt Strike Beacon Object Files☆160Updated 2 years ago
- Scripts for performing and detecting parent PID spoofing☆143Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆253Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆215Updated last year
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- ☆147Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆144Updated last year
- Reflective DLL loading of your favorite Golang program☆166Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- bdvl☆112Updated 2 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago
- ☆99Updated 4 years ago
- ☆124Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆182Updated 3 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆139Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Collection of tested Cobaltstrike aggressor scripts.☆110Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago