g0h4n / RDE1
RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. π¦
β39Updated last year
Alternatives and similar repositories for RDE1:
Users that are interested in RDE1 are comparing it to the libraries listed below
- Source code and examples for PassiveAggressionβ55Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLβ40Updated 9 months ago
- Sliver extension to bypass UAC via cmstp written in rustβ25Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β47Updated last year
- PowerShell Reverse Shellβ61Updated last year
- β51Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.β55Updated last year
- Inject RDPThief into memory with PowerShell.β61Updated 2 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)β64Updated 9 months ago
- Encodes a payload within a generated mock-CSS fileβ59Updated last year
- Example code samples from our ScriptBlock Smuggling Blog postβ90Updated 9 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β23Updated 2 months ago
- β29Updated this week
- Situational Awareness script to identify how and where to run implantsβ46Updated 3 months ago
- β48Updated 4 months ago
- β83Updated 2 months ago
- Duplicate not owned Token from Running Processβ72Updated last year
- Lateral Movementβ123Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy serviceβ74Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!β84Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstalβ¦β32Updated 3 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.β37Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β80Updated last year
- Adversary Emulation Frameworkβ92Updated 7 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snafflerβ97Updated 4 months ago
- Lifetime AMSI bypass.β35Updated 8 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- A Python POC for CRED1 over SOCKS5β142Updated 5 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ngβ44Updated last year