grahamhelton / USPLinks
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
☆145Updated 10 months ago
Alternatives and similar repositories for USP
Users that are interested in USP are comparing it to the libraries listed below
Sorting:
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆131Updated 7 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated 11 months ago
- ☆159Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆139Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆147Updated 2 months ago
- ☆201Updated 2 weeks ago
- ☆178Updated 2 weeks ago
- Local & remote Windows DLL Proxying☆164Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆117Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- Decrypt GlobalProtect configuration and cookie files.☆149Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 2 months ago
- ☆137Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 7 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- ☆180Updated 3 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- Automating the MITM attack on WSUS☆176Updated this week
- Stage 0☆161Updated 6 months ago
- ☆118Updated 3 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 3 months ago
- A Mythic Agent written in PIC C.☆190Updated 4 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year