krabelize / icmpdoor
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
☆336Updated 5 months ago
Alternatives and similar repositories for icmpdoor:
Users that are interested in icmpdoor are comparing it to the libraries listed below
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆255Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆296Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆668Updated 2 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆461Updated 4 months ago
- Kerberoast with ACL abuse capabilities☆403Updated 2 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆896Updated 8 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆698Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆595Updated 7 months ago
- Just another Powerview alternative☆564Updated 3 weeks ago
- ☆759Updated 2 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆357Updated 3 months ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆848Updated 3 months ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆389Updated 5 months ago
- ☆650Updated 2 weeks ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆951Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆334Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆513Updated 3 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆632Updated 10 months ago
- a tool to help operate in EDRs' blind spots☆698Updated 2 months ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Updated 5 months ago
- An script to perform kerberos bruteforcing by using impacket☆445Updated 2 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆592Updated 4 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆383Updated 10 months ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆271Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆430Updated last year
- ☆187Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆456Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,179Updated last year
- Password spraying tool and Bloodhound integration☆220Updated last month
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆352Updated last year