krabelize / icmpdoor
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
☆325Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for icmpdoor
- ☆171Updated 4 years ago
- ☆730Updated 2 years ago
- Just another Powerview alternative☆456Updated this week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆290Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆564Updated 4 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆801Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆856Updated 5 months ago
- ☆208Updated 4 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆514Updated 8 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆799Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆599Updated last week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,139Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆807Updated 5 months ago
- Hide your payload in DNS☆604Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆413Updated 7 months ago
- Kerberoast with ACL abuse capabilities☆327Updated last week
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆925Updated 2 years ago
- Useful C2 techniques and cheatsheets learned from engagements☆425Updated 3 weeks ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- ☆498Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆700Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,224Updated this week
- Password spraying and bruteforcing tool for Active Directory Domain Services☆345Updated last week
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Updated last year
- Windows Local Privilege Escalation from Service Account to System☆687Updated 4 years ago
- ☆401Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆623Updated 7 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆492Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆683Updated last year