mnemonic-no / SNIcat
SNIcat
☆126Updated 3 years ago
Alternatives and similar repositories for SNIcat:
Users that are interested in SNIcat are comparing it to the libraries listed below
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Burp with Friends☆102Updated 2 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- ☆69Updated 3 years ago
- ☆129Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆91Updated 6 years ago
- A Django application to help red team operators manage a library of domain names☆162Updated last year
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Simulating Adversary Operations☆92Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- An epic web shell☆84Updated last month
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Responsive Command and Control System☆102Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆107Updated 2 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆121Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆224Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago