evallen / ntpescape
NTP Exfiltration Tool
☆138Updated last year
Alternatives and similar repositories for ntpescape:
Users that are interested in ntpescape are comparing it to the libraries listed below
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆193Updated 3 months ago
- Ping-based Information Lookup and Outbound Transfer☆78Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 6 months ago
- Dredging up secrets from the depths of the file system☆125Updated 5 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆135Updated this week
- Signature based honeypot detector tool written in Golang☆89Updated 3 weeks ago
- A delicious, but malicious SSL-VPN server 🌮☆217Updated 4 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated last week
- ☆534Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆143Updated 10 months ago
- Generate graphs and charts based on password cracking result☆159Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- ☆174Updated 4 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆53Updated last month
- Useful collection of scapy-scripts and more☆27Updated 9 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆195Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆108Updated 3 months ago
- Azure mindmap for penetration tests☆181Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆214Updated 3 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated 2 months ago
- A monster cheatsheet on MITM attacks☆346Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆50Updated last week
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆148Updated 5 months ago
- exfiltration/infiltration toolkit☆44Updated 5 months ago