g0h4n / RDE1Links
RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. π¦
β41Updated 8 months ago
Alternatives and similar repositories for RDE1
Users that are interested in RDE1 are comparing it to the libraries listed below
Sorting:
- Encodes a payload within a generated mock-CSS fileβ59Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy serviceβ76Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLβ42Updated last year
- Sliver extension to bypass UAC via cmstp written in rustβ34Updated last year
- Permanently disable EDRs as local adminβ122Updated this week
- A small red team courseβ40Updated 2 years ago
- β94Updated 11 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ngβ49Updated last year
- Situational Awareness script to identify how and where to run implantsβ67Updated last year
- Deploy a phishing infrastructure on the fly.β78Updated last year
- β62Updated last week
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.β83Updated this week
- Inject RDPThief into memory with PowerShell.β65Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snafflerβ114Updated 5 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine withβ¦β79Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.β62Updated 5 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagementsβ49Updated 2 weeks ago
- β73Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.β133Updated 11 months ago
- β52Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.β43Updated last year
- Example code samples from our ScriptBlock Smuggling Blog postβ92Updated last year
- β151Updated 7 months ago
- Source code and examples for PassiveAggressionβ64Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTPβ41Updated 11 months ago
- β25Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ181Updated 7 months ago
- A C2 framework built for my bachelors thesisβ54Updated 3 weeks ago
- A Moodle Scannerβ43Updated last year