get-get-get-get / PowerProxy
PowerShell SOCKS proxy with reverse proxy capabilities
☆77Updated 3 years ago
Alternatives and similar repositories for PowerProxy:
Users that are interested in PowerProxy are comparing it to the libraries listed below
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- ☆125Updated last year
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Powershell version of SharpGPOAbuse☆70Updated 3 years ago
- ☆92Updated 2 years ago
- Password Spraying Framework☆63Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆99Updated 2 years ago
- ☆66Updated 4 years ago
- C# tool to discover low hanging fruits☆89Updated 2 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆53Updated 4 years ago
- ☆155Updated 2 months ago
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Updated 3 years ago
- ☆92Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆41Updated 3 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆153Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago
- Simple APPLocker bypass summary☆39Updated 6 years ago
- ADCS abuser☆265Updated last year
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆173Updated 2 years ago
- Checks for signature requirements over LDAP☆94Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Simple rapper for Mimikatz, bypass Defender☆139Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago