dsnezhkov / SSHoRTyLinks
A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
☆133Updated 6 years ago
Alternatives and similar repositories for SSHoRTy
Users that are interested in SSHoRTy are comparing it to the libraries listed below
Sorting:
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆140Updated 4 years ago
- ☆98Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆143Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- A repo full of example gscripts☆100Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- ☆129Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆185Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- A simple, extensible C&C beaconing system.☆101Updated 7 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- ☆126Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 7 months ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆234Updated 5 years ago