mdsecactivebreach / Chameleon
Chameleon: A tool for evading Proxy categorisation
☆486Updated 3 months ago
Alternatives and similar repositories for Chameleon:
Users that are interested in Chameleon are comparing it to the libraries listed below
- Malicious WMI Events using PowerShell☆380Updated 8 years ago
- Kerberoast attack -pure python-☆427Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆217Updated last year
- Search for potential frontable domains☆622Updated 2 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆443Updated 7 years ago
- ☆517Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆227Updated 3 years ago
- Generates malicious LNK file payloads for data exfiltration☆375Updated 7 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆323Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆264Updated 6 years ago
- NTLMv1 Multitool☆611Updated last week
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆835Updated 3 years ago
- LDAP library for auditing MS AD☆406Updated last week
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆433Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆516Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆384Updated 3 years ago
- ☆190Updated 5 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆370Updated 3 years ago
- Rapid Attack Infrastructure (RAI)☆303Updated 4 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆716Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆376Updated 5 years ago
- linikatz is a tool to attack AD on UNIX☆549Updated last year
- Exchange privilege escalations to Active Directory☆754Updated last year
- Search for categorized domain☆444Updated 6 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆640Updated last year
- ☆257Updated 2 years ago