lexfo / sshimpanzee
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
☆257Updated last week
Alternatives and similar repositories for sshimpanzee:
Users that are interested in sshimpanzee are comparing it to the libraries listed below
- Extract and execute a PE embedded within a PNG file using an LNK file.☆365Updated 4 months ago
- Multiplayer pivoting solution☆252Updated last week
- Generate an obfuscated DLL that will disable AMSI & ETW☆317Updated 7 months ago
- ☆274Updated last year
- shellcode loader for your evasion needs☆315Updated 4 months ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- yet another AV killer tool using BYOVD☆266Updated last year
- ☆284Updated last year
- DPAPI looting remotely and locally in Python☆443Updated 2 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆278Updated 2 months ago
- Simulate the behavior of AV/EDR for malware development training.☆501Updated last year
- Native Syscalls Shellcode Injector☆264Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆267Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆562Updated 8 months ago
- A command and control framework written in rust.☆311Updated 2 weeks ago
- Apply a divide and conquer approach to bypass EDRs☆279Updated last year
- ☆296Updated 4 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- Amsi Bypass payload that works on Windwos 11☆376Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆507Updated 7 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆282Updated 4 months ago
- Tool to remotely dump secrets from the Windows registry☆434Updated 2 weeks ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆196Updated 2 years ago
- A dirty PoC for a reverse shell with cool features in Rust☆181Updated 6 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆322Updated 7 months ago
- ☆219Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆437Updated last month
- Kill AV/EDR leveraging BYOVD attack☆342Updated last year