jojonas / db_nmapLinks
Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.
☆18Updated 7 months ago
Alternatives and similar repositories for db_nmap
Users that are interested in db_nmap are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- Cobalt Strike Get clipboard plugin☆14Updated last year
- Collection of self-made Red Team tools that have come in handy☆11Updated 9 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- .NET 4.0 Fast Directory / File Lister☆26Updated 4 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Golang Implementation of Hell's gate☆17Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆56Updated this week
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆27Updated 10 months ago
- Go implementation of the PwnKit Linux Local Privilege Escalation exploit (CVE-2021-4034)☆8Updated 3 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated last year
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- ADSI based SA tool☆17Updated 3 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago