grahamhelton / USPLinks
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
☆146Updated last year
Alternatives and similar repositories for USP
Users that are interested in USP are comparing it to the libraries listed below
Sorting:
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 8 months ago
- Decrypt GlobalProtect configuration and cookie files.☆158Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- Adversary Emulation Framework☆129Updated 6 months ago
- ☆165Updated last year
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Permanently disable EDRs as local admin☆124Updated last month
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- ☆157Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- Utilities for obfuscating shellcode☆98Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- ☆132Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆257Updated 8 months ago
- ☆119Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated 2 years ago