mufeedvh / moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
☆1,391Updated 2 years ago
Alternatives and similar repositories for moonwalk:
Users that are interested in moonwalk are comparing it to the libraries listed below
- This map lists the essential techniques to bypass anti-virus and EDR☆2,721Updated last month
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,921Updated this week
- Notion as a platform for offensive operations☆1,154Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,766Updated 10 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,532Updated 2 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,752Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,090Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,932Updated 2 weeks ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,288Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,439Updated 3 months ago
- Penelope Shell Handler☆853Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,794Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,280Updated 8 months ago
- Extract credentials from lsass remotely☆2,098Updated 2 months ago
- An XSS exploitation command-line interface and payload generator.☆1,346Updated 2 months ago
- Privilege Escalation Enumeration Script for Windows☆3,152Updated 2 weeks ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,286Updated last month
- Dangerously fast DNS/network/port scanner☆897Updated 3 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,332Updated 3 months ago
- Hash type identifier (CLI & lib)☆847Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,428Updated last year
- Rockyou for web fuzzing☆2,736Updated 3 weeks ago
- Notes about attacking Jenkins servers☆2,036Updated 8 months ago
- Red Team Cheatsheet in constant expansion.☆1,164Updated last year
- evilginx3 + gophish☆1,740Updated 9 months ago
- Real-world infosec wordlists, updated regularly☆1,464Updated this week
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,524Updated last year
- ☆1,041Updated 10 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,840Updated 7 months ago