io-tl / MaraLinks
Mara is a userland pty/tty sniffer
☆53Updated 2 years ago
Alternatives and similar repositories for Mara
Users that are interested in Mara are comparing it to the libraries listed below
Sorting:
- An evil bit backdoor for iptables☆54Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- ☆68Updated 3 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Updated 3 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- pypykatz plugin for volatility3 framework☆45Updated 7 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- ☆43Updated 3 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- TypeScript/JavaScript client libraries for Sliver☆23Updated 2 years ago
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- ☆129Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- ☆90Updated 2 years ago
- ☆27Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 5 years ago
- The God Name Server☆34Updated this week
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- ☆12Updated 2 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago