referefref / Rusty-TelephoneLinks
Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC
☆64Updated last year
Alternatives and similar repositories for Rusty-Telephone
Users that are interested in Rusty-Telephone are comparing it to the libraries listed below
Sorting:
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- ☆59Updated last year
- Windows Administrator level Implant.☆50Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- A red teaming attack paradigm against AI Agents☆32Updated 10 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 11 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆85Updated 2 weeks ago
- ☆42Updated 8 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- A service container for interacting with SRA's VECTR☆15Updated 9 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆57Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with …☆79Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated 5 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Payload Generation Workflow☆40Updated 6 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- ☆35Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- ☆52Updated last year