paranoidninja / Boomerang
Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Multiple levels of Pivoting and exposing multiple internal services to external/other networks
β219Updated 4 years ago
Alternatives and similar repositories for Boomerang:
Users that are interested in Boomerang are comparing it to the libraries listed below
- HoneyCreds network credential injection to detect responder and other network poisoners.β216Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!β225Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints πβ470Updated 7 months ago
- Password Hunter in Active Directoryβ197Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and otheβ¦β176Updated 2 years ago
- Lookup for interesting stuff in SMB sharesβ149Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components andβ¦β209Updated 4 years ago
- β149Updated last year
- User enumeration with Microsoft Teams APIβ168Updated 3 years ago
- Golang reverse/bind shell generatorβ228Updated 3 years ago
- easy-to-use payload hostingβ266Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraformβ260Updated 6 years ago
- automated password spraying toolβ147Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands iβ¦β111Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenariosβ142Updated last year
- A robust Red Team proxy written in Go.β159Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Optβ¦β211Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ209Updated 4 years ago
- Quick and dirty dynamic redirect.rules generatorβ155Updated 2 years ago
- β333Updated 2 years ago
- A polyglot payload generatorβ239Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.β297Updated last year
- Basic C2 Serverβ186Updated 3 years ago
- scan for NTLM directoriesβ354Updated 7 months ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)β145Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructureβ93Updated 5 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.β128Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ221Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.β438Updated last year
- β51Updated 6 years ago