krabelize / icmpdoorLinks
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
☆360Updated last year
Alternatives and similar repositories for icmpdoor
Users that are interested in icmpdoor are comparing it to the libraries listed below
Sorting:
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆305Updated 2 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆382Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆548Updated last year
- ☆240Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- ☆292Updated 4 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- Hide your payload in DNS☆615Updated 2 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆689Updated last month
- Python version of the C# tool for "Shadow Credentials" attacks☆807Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆614Updated this week
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆340Updated last year
- Powershell script to extract information from boot PXE☆149Updated 6 years ago
- Kerberoast with ACL abuse capabilities☆570Updated 10 months ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆371Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆919Updated 2 years ago
- A small reverse shell for Linux & Windows☆613Updated last year
- IOXIDResolver.py from AirBus Security☆258Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆341Updated last year
- Dumping LAPS from Python☆280Updated 2 years ago
- Useful C2 techniques and cheat sheets learned from engagements☆553Updated last month
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆443Updated last year
- Password spraying tool and Bloodhound integration☆246Updated 9 months ago
- Partial python implementation of SharpGPOAbuse☆476Updated last month
- ☆123Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆571Updated 2 months ago
- ☆805Updated 3 years ago
- ☆220Updated 5 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆649Updated 5 years ago
- ☆471Updated 11 months ago