eeriedusk / nysm
nysm is a stealth post-exploitation container.
☆246Updated last year
Alternatives and similar repositories for nysm:
Users that are interested in nysm are comparing it to the libraries listed below
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated last week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆263Updated last month
- Get root via TTY / TIOCSTI stuffing☆71Updated 9 months ago
- RCE exploit for CVE-2023-3519☆223Updated last year
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆209Updated last week
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 7 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆193Updated 5 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆404Updated 5 months ago
- yet another AV killer tool using BYOVD☆270Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆394Updated last year
- Go shellcode loader that combines multiple evasion techniques☆364Updated last year
- eBPF hacks☆186Updated 4 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆181Updated 7 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆140Updated 3 months ago
- shellcode loader for your evasion needs☆317Updated 5 months ago
- Harvest passwords automatically from OpenSSH server☆373Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆382Updated 8 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago
- ☆233Updated 6 months ago
- Different methods to get current username without using whoami☆174Updated last year
- Fileless atexec, no more need for port 445☆366Updated last year
- AV bypass while you sip your Chai!☆220Updated 11 months ago
- ☆163Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆271Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆225Updated 3 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- The Official Sliver Armory☆102Updated last week
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆216Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆297Updated 5 months ago