mikkolehtisalo / gssapi-proxy
GSSAPI/Kerberos proxy
☆31Updated 10 years ago
Alternatives and similar repositories for gssapi-proxy:
Users that are interested in gssapi-proxy are comparing it to the libraries listed below
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- ☆53Updated 10 years ago
- ☆52Updated 6 years ago
- gpocheck☆30Updated 8 months ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12Updated 8 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- Collect autorun records from running system☆61Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- ☆79Updated 9 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Projects and POCs☆60Updated 10 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Updated 9 years ago
- All the Power with no Shell☆36Updated 3 years ago
- ☆97Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆59Updated 5 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- A simple tool to manipulate window objects in Windows☆44Updated 8 years ago