a secure and highly-portable reverse proxy (redirector) for your Red Team infrastructure.
☆34Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for ruse
Users that are interested in ruse are comparing it to the libraries listed below
Sorting:
- ☆37Jun 27, 2020Updated 5 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆89Jun 30, 2020Updated 5 years ago
- phpstudy get shell☆23Jan 1, 2016Updated 10 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- certbook☆58Jul 28, 2017Updated 8 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165May 14, 2020Updated 5 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- CVE-2020-11651&&CVE-2020-11652 EXP☆24Mar 21, 2023Updated 2 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Sep 25, 2020Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- A modern replacement for ‘ln’. It is inspired by exa.☆16Mar 2, 2020Updated 6 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- [CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE☆18Mar 17, 2025Updated 11 months ago
- Behinder source code☆175Nov 1, 2021Updated 4 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- 批量漏洞扫描框架☆122Apr 24, 2024Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆46Jun 24, 2023Updated 2 years ago
- Powerful script for logical obfuscation of powershell scripts☆29Mar 7, 2019Updated 6 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- Linux kernel based keylogger☆14Mar 24, 2014Updated 11 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- java UI 插件化漏洞扫描工具☆18Apr 14, 2020Updated 5 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆205May 25, 2021Updated 4 years ago