Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.
☆17Jul 1, 2022Updated 3 years ago
Alternatives and similar repositories for rpivot2
Users that are interested in rpivot2 are comparing it to the libraries listed below
Sorting:
- ☆24Oct 18, 2022Updated 3 years ago
- ☆537Updated this week
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Hosting PowerShell in Python☆43Jun 17, 2022Updated 3 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆18Jan 12, 2026Updated last month
- ☆11Jul 11, 2023Updated 2 years ago
- ☆10Jun 26, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- 多线程队列消费work 含有优先级的work 有限流的work可以简易的使用多线程做更多的事情☆11Jul 3, 2024Updated last year
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- ☆30Mar 21, 2023Updated 2 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- ☆17Mar 6, 2023Updated 2 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- ☆159Feb 8, 2025Updated last year
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 7 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆75Feb 4, 2026Updated 3 weeks ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- ☆25May 13, 2019Updated 6 years ago