ethicalhackeragnidhra / LaZagne
☆10Updated 7 years ago
Alternatives and similar repositories for LaZagne:
Users that are interested in LaZagne are comparing it to the libraries listed below
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- ☆39Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆16Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- ☆12Updated 4 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated 2 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- Dumping credentials through windbg and pykd☆40Updated last year
- Simple C2 over the Trello API☆38Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A collection of my presentation materials.☆17Updated 11 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago