evallen / ntpescape
NTP Exfiltration Tool
☆138Updated last year
Alternatives and similar repositories for ntpescape:
Users that are interested in ntpescape are comparing it to the libraries listed below
- Nuclei templates for honeypots detection.☆196Updated last year
- Ping-based Information Lookup and Outbound Transfer☆74Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- ☆57Updated last year
- ☆174Updated 3 months ago
- Azure mindmap for penetration tests☆179Updated last year
- Signature based honeypot detector tool written in Golang☆89Updated this week
- Dredging up secrets from the depths of the file system☆122Updated 4 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- Canary Detection☆164Updated 11 months ago
- linikatz is a tool to attack AD on UNIX☆144Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆143Updated 4 months ago
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆117Updated last year
- ☆531Updated 11 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- ☆284Updated last year
- Advanced Email Threat Hunting w/ Detection as Code☆51Updated last month
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆137Updated 9 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆271Updated 8 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆147Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆126Updated 4 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 9 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆68Updated 7 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆206Updated 2 months ago