icyguider / ICMP-TransferTools
Transfer files to and from a Windows host via ICMP in restricted network environments.
☆322Updated 3 years ago
Alternatives and similar repositories for ICMP-TransferTools:
Users that are interested in ICMP-TransferTools are comparing it to the libraries listed below
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆411Updated last month
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆272Updated 3 years ago
- ☆467Updated 4 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆487Updated 4 months ago
- ☆406Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- ☆511Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆365Updated 3 years ago
- NTLM relaying for Windows made easy☆557Updated last year
- ☆767Updated 2 years ago
- ☆406Updated last year
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆515Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- ☆446Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆633Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆457Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆431Updated last year
- Convert shellcode into different formats!☆349Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆487Updated 2 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆785Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆481Updated 3 weeks ago
- Self-developed tools for Lateral Movement/Code Execution☆703Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆839Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆302Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆540Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆742Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆453Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆318Updated 9 months ago