eeriedusk / nysm
nysm is a stealth post-exploitation container.
☆243Updated last year
Alternatives and similar repositories for nysm:
Users that are interested in nysm are comparing it to the libraries listed below
- Nameless C2 - A C2 with all its components written in Rust☆261Updated 5 months ago
- eBPF hacks☆182Updated 2 months ago
- shellcode loader for your evasion needs☆313Updated 3 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆243Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆249Updated 6 months ago
- RCE exploit for CVE-2023-3519☆221Updated last year
- Go shellcode loader that combines multiple evasion techniques☆363Updated last year
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆212Updated 11 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆357Updated 4 months ago
- Evasive shellcode loader☆343Updated 4 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆370Updated 6 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆266Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- Fileless atexec, no more need for port 445☆356Updated 11 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆179Updated 5 months ago
- yet another AV killer tool using BYOVD☆264Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆428Updated last year
- indirect syscalls for AV/EDR evasion in Go assembly☆324Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆172Updated 5 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆228Updated last month
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆119Updated 10 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆429Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆514Updated 11 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated last month
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆224Updated last month
- A command and control framework written in rust.☆310Updated last week
- Different methods to get current username without using whoami☆174Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆189Updated 3 months ago