efeali / fragtunnel
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
☆168Updated 10 months ago
Alternatives and similar repositories for fragtunnel:
Users that are interested in fragtunnel are comparing it to the libraries listed below
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago
- Everything and anything related to password spraying☆134Updated 11 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆209Updated last week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆297Updated 5 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆182Updated last year
- Reaping treasures from strings in remote processes memory☆252Updated 2 months ago
- ☆299Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆160Updated last week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆82Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆164Updated last week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆146Updated 11 months ago
- ☆156Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆208Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆161Updated 4 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆202Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆363Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆197Updated 2 months ago
- Active Directory Authentication Library☆65Updated last week
- ☆51Updated 2 months ago
- Generate and Manage KeyCredentialLinks☆151Updated last week
- psexecsvc - a python implementation of PSExec's native service implementation☆195Updated 2 months ago
- Different methods to get current username without using whoami☆174Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆255Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆54Updated 5 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆277Updated 8 months ago