evallen / ntpescape
NTP Exfiltration Tool
☆136Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for ntpescape
- Ping-based Information Lookup and Outbound Transfer☆75Updated 6 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆107Updated last week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆111Updated 5 months ago
- Dredging up secrets from the depths of the file system☆116Updated this week
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆166Updated 2 months ago
- Nuclei templates for honeypots detection.☆192Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆100Updated last year
- Azure mindmap for penetration tests☆161Updated 11 months ago
- ☆281Updated 11 months ago
- ☆134Updated 3 weeks ago
- Signature based honeypot detector tool written in Golang☆84Updated 5 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 9 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆162Updated last year
- A monster cheatsheet on MITM attacks☆317Updated 8 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆137Updated last year
- Amazing whoami alternatives☆135Updated 7 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆156Updated 6 months ago
- ☆168Updated 3 weeks ago
- Modern web-based distributed hashcracking solution, built on hashcat☆113Updated last week
- ☆40Updated 2 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆108Updated 9 months ago
- Tool for hiding Kali Linux on the network☆294Updated 5 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆134Updated this week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- Monitor changes in Active Directory with replication metadata☆81Updated 4 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆120Updated last week