gellin / bantam
A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
☆268Updated 2 years ago
Alternatives and similar repositories for bantam:
Users that are interested in bantam are comparing it to the libraries listed below
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago
- Windows active user credential phishing tool☆281Updated 4 years ago
- SonicWall SSL-VPN Exploit☆174Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆312Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆471Updated 8 months ago
- ☆291Updated 8 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆793Updated 2 years ago
- C# Script used for Red Team☆718Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆256Updated 3 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆279Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆310Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆286Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Updated 2 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆240Updated 3 years ago
- Find specific users in active directory via their username and logon IP address☆380Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆213Updated 4 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆313Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆515Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆660Updated 5 years ago
- Simple executable generator with encrypted shellcode.☆279Updated 2 years ago
- ☆332Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆203Updated 4 years ago
- ☆353Updated 3 years ago
- gather gather gather☆570Updated 11 months ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆267Updated 3 years ago
- A polyglot payload generator☆239Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆354Updated 4 years ago