lexfo / sshimpanzee
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
☆257Updated 2 weeks ago
Alternatives and similar repositories for sshimpanzee:
Users that are interested in sshimpanzee are comparing it to the libraries listed below
- yet another AV killer tool using BYOVD☆268Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 7 months ago
- Nameless C2 - A C2 with all its components written in Rust☆262Updated 5 months ago
- ☆274Updated last year
- A dirty PoC for a reverse shell with cool features in Rust☆182Updated 6 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- ☆284Updated last week
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆197Updated 2 years ago
- shellcode loader for your evasion needs☆316Updated 4 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆507Updated 7 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆317Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated 11 months ago
- Multiplayer pivoting solution☆257Updated 2 weeks ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆572Updated 8 months ago
- A command and control framework written in rust.☆311Updated last month
- ☆296Updated 4 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆180Updated 6 months ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆269Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆287Updated 4 months ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆367Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆278Updated 2 months ago
- Simulate the behavior of AV/EDR for malware development training.☆514Updated last year
- ☆232Updated 4 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆532Updated 4 months ago