grahamhelton / USP
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
☆140Updated 6 months ago
Alternatives and similar repositories for USP:
Users that are interested in USP are comparing it to the libraries listed below
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆159Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆129Updated 4 months ago
- ☆190Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆144Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆147Updated last week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆159Updated 3 months ago
- A Mythic Agent written in PIC C.☆183Updated last month
- ☆170Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Python utility that generates "imageless" QR codes in various formats☆115Updated 7 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Decrypt GlobalProtect configuration and cookie files.☆144Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- ☆83Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- Stage 0☆154Updated 3 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- ☆52Updated 3 weeks ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"