Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams
☆621Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for phantap
Users that are interested in phantap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- ☆110May 14, 2018Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,608Jul 10, 2023Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Process Injection☆768Oct 24, 2021Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆604Mar 2, 2021Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,417Oct 3, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,557Oct 17, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231May 30, 2019Updated 6 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,313Dec 15, 2020Updated 5 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago