referefref / Rusty-TelephoneLinks
Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC
☆61Updated 7 months ago
Alternatives and similar repositories for Rusty-Telephone
Users that are interested in Rusty-Telephone are comparing it to the libraries listed below
Sorting:
- ☆10Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 4 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 11 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆39Updated last week
- Windows Administrator level Implant.☆49Updated 9 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆31Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 8 months ago
- ☆35Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- ☆55Updated 8 months ago
- Vast.ai Password Kracking☆74Updated last month
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 9 months ago
- ☆17Updated 9 months ago
- ☆22Updated 4 months ago
- ☆29Updated 2 weeks ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆53Updated 2 weeks ago
- This repo contains a PoC of exploiting Worst Fit (props to Orange Tsai and Splitline who presented this research at Black Hat EMEA 2024)☆10Updated 7 months ago
- ☆26Updated 4 months ago
- Monarch - The Adversary Emulation Toolkit☆61Updated 6 months ago
- Linux CS bypass technique☆33Updated 5 months ago
- A red teaming attack paradigm against AI Agents☆31Updated 4 months ago
- ☆17Updated 6 months ago