grahamhelton / USPLinks
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
☆147Updated last year
Alternatives and similar repositories for USP
Users that are interested in USP are comparing it to the libraries listed below
Sorting:
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Updated 6 months ago
- Decrypt GlobalProtect configuration and cookie files.☆158Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- Permanently disable EDRs as local admin☆125Updated last month
- The most average C2 ever (MACE)☆97Updated 3 years ago
- ☆133Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Utilities for obfuscating shellcode☆98Updated 4 months ago
- ☆159Updated 9 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Updated 2 weeks ago
- Adversary Emulation Framework☆129Updated 7 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- ☆94Updated last year
- ☆120Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- ☆120Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- ☆167Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆143Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- A Mythic Agent written in PIC C.☆206Updated last year
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago