pentestpartners / Uninvited-GuestLinks
Uninvited Guest - A file server for files over DNS TXT records
☆22Updated 9 months ago
Alternatives and similar repositories for Uninvited-Guest
Users that are interested in Uninvited-Guest are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆36Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- ☆99Updated 6 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- ☆82Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- ☆110Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆74Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 7 months ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 7 months ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- gpocheck☆30Updated 11 months ago