praetorian-inc / turntLinks
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
☆91Updated last week
Alternatives and similar repositories for turnt
Users that are interested in turnt are comparing it to the libraries listed below
Sorting:
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆180Updated last week
- Decrypt GlobalProtect configuration and cookie files.☆150Updated 11 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆120Updated 2 weeks ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- A Python POC for CRED1 over SOCKS5☆153Updated 10 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆165Updated 3 months ago
- Adversary Emulation Framework☆121Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆144Updated 11 months ago
- ☆205Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 7 months ago
- ☆144Updated 3 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆70Updated 4 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆84Updated this week
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Python utility that generates "imageless" QR codes in various formats☆125Updated last year
- OAuth Device Code Phishing Toolkit☆66Updated 3 months ago
- ☆189Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 6 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆125Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆204Updated 9 months ago
- BloodHound PowerShell client☆58Updated 2 weeks ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆77Updated this week
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆167Updated last year
- Automating the MITM attack on WSUS☆259Updated last month
- Stage 0☆163Updated 7 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆159Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 3 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆317Updated last month