Hiding your infrastructure from the boys in blue.
☆23Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for sneaky_proxy
Users that are interested in sneaky_proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆57Aug 19, 2024Updated last year
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 9 months ago
- ☆117Jun 2, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- ☆39Mar 25, 2021Updated 4 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Feb 23, 2026Updated last month
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Tool to get NT system shell .☆24Jul 12, 2021Updated 4 years ago
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last month
- Bunch of BOF files☆40Jun 30, 2025Updated 8 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Convenience tool for hashcat☆121Aug 26, 2025Updated 6 months ago
- ☆14Oct 25, 2019Updated 6 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Easily obfuscate your html!☆99Apr 7, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago