mohemiv / TCLtools
Сollection of TCL scripts for Cisco IOS penetration testing
☆64Updated 6 years ago
Alternatives and similar repositories for TCLtools:
Users that are interested in TCLtools are comparing it to the libraries listed below
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- ☆31Updated 5 years ago
- Cisco IOS SNMP RCE PoC☆245Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Updated 5 years ago
- ☆33Updated 9 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆112Updated 3 years ago
- POC for Cobalt Strike external C2☆132Updated 3 years ago
- A Linux RAT in C☆33Updated 6 years ago
- ☆42Updated 5 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- ☆76Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- ☆94Updated 6 years ago
- ☆54Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- ☆36Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 6 months ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 8 months ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- few months old but better than nothing☆58Updated 3 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago