ekiojp / dfex
DNS File EXfiltration
☆46Updated 9 months ago
Alternatives and similar repositories for dfex:
Users that are interested in dfex are comparing it to the libraries listed below
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 7 months ago
- Alphanumeric Encoder☆25Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- UglyEXe - bypass some AVs☆16Updated 4 years ago
- ☆11Updated 2 years ago
- ☆55Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆35Updated 6 years ago
- ☆43Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆23Updated 4 years ago
- Updated 6 years ago
- eternalrelayx☆38Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A tool for creating proxy dll for hijacking☆40Updated 3 months ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Kubernetes Scanner☆40Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 5 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆63Updated 5 years ago