Hiding your infrastructure from the boys in blue.
☆23Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for sneaky_proxy
Users that are interested in sneaky_proxy are comparing it to the libraries listed below
Sorting:
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 4 years ago
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 8 months ago
- ☆57Aug 19, 2024Updated last year
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆118Jun 2, 2021Updated 4 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- Run BloodHound CE in a single-user setup with podman☆36Nov 12, 2025Updated 3 months ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last week
- Easily obfuscate your html!☆100Apr 7, 2024Updated last year
- Bunch of BOF files☆39Jun 30, 2025Updated 8 months ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 5 months ago
- ☆20Feb 23, 2019Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year