mohemiv / TCLtoolsLinks
Сollection of TCL scripts for Cisco IOS penetration testing
☆64Updated 6 years ago
Alternatives and similar repositories for TCLtools
Users that are interested in TCLtools are comparing it to the libraries listed below
Sorting:
- Cisco IOS SNMP RCE PoC☆246Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- ☆31Updated 5 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆70Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- initial commit☆44Updated 6 months ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆52Updated 6 years ago
- ☆54Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- ☆94Updated 6 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- ☆62Updated 4 years ago
- with metasploit☆63Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆43Updated 5 years ago
- ☆58Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 3 months ago
- ☆70Updated 6 years ago