SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
☆287Mar 5, 2025Updated last year
Alternatives and similar repositories for sshimpanzee
Users that are interested in sshimpanzee are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Mar 4, 2021Updated 5 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated last week
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆480Sep 19, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆617Jan 2, 2025Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆578Jan 20, 2026Updated 2 months ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Aug 2, 2023Updated 2 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Real fucking shellcode encryptor & obfuscator tool☆1,013Jan 7, 2026Updated 2 months ago
- ☆569Mar 28, 2024Updated last year
- ☆224Oct 22, 2023Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- ☆223Mar 10, 2024Updated 2 years ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆473Jul 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Linux Sleep Obfuscation☆113Jan 7, 2024Updated 2 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- A COFF loader made in Rust☆328Mar 14, 2026Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆130Sep 27, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆149Aug 26, 2024Updated last year
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆789Jan 9, 2025Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,080Feb 1, 2024Updated 2 years ago