mdsecactivebreach / ChameleonLinks
Chameleon: A tool for evading Proxy categorisation
☆496Updated 6 months ago
Alternatives and similar repositories for Chameleon
Users that are interested in Chameleon are comparing it to the libraries listed below
Sorting:
- Malicious WMI Events using PowerShell☆387Updated 8 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆227Updated 2 years ago
- Kerberoast attack -pure python-☆434Updated last year
- Generates malicious LNK file payloads for data exfiltration☆399Updated 7 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- ☆522Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆860Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆727Updated 3 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆448Updated 7 years ago
- Disposable and resilient red team infrastructure with Terraform☆267Updated 6 years ago
- Exchange privilege escalations to Active Directory☆766Updated 2 years ago
- Search for potential frontable domains☆626Updated 2 years ago
- Aggressor scripts I've made for Cobalt Strike☆407Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- Rapid Attack Infrastructure (RAI)☆305Updated 6 months ago
- LDAP library for auditing MS AD☆421Updated last week
- NTLMv1 Multitool☆620Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆262Updated last year
- ☆198Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆329Updated 5 years ago
- Bypass for PowerShell Constrained Language Mode☆392Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆439Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- linikatz is a tool to attack AD on UNIX☆559Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆424Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,018Updated 5 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆379Updated 5 years ago
- Enumerate Domain Data☆327Updated last year