grahamhelton / USPLinks
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
☆147Updated last year
Alternatives and similar repositories for USP
Users that are interested in USP are comparing it to the libraries listed below
Sorting:
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆151Updated 2 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- ☆132Updated 2 years ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Permanently disable EDRs as local admin☆118Updated 3 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆103Updated 7 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Decrypt GlobalProtect configuration and cookie files.☆151Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Group Policy Objects manipulation and exploitation framework☆264Updated 2 weeks ago
- ☆148Updated 5 months ago
- ☆160Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆119Updated 7 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆98Updated last week
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆133Updated last year