reverse socks tunneler with ntlm and proxy support
☆28Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for rsockstun
Users that are interested in rsockstun are comparing it to the libraries listed below
Sorting:
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- ☆39Apr 8, 2020Updated 5 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Setup for windows kernel development (development, debugging automation and compiling)☆17Jan 30, 2021Updated 5 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆14Feb 10, 2025Updated last year
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 4 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Sep 22, 2022Updated 3 years ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated 11 months ago
- ☆22Jun 21, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆53Sep 20, 2022Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Mar 28, 2023Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- A self-hosted scheduler app that will upgrade or downgrade your EC2 servers for you.☆18Jun 17, 2022Updated 3 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago