ricardojoserf / SharpCovertTube
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
☆89Updated 10 months ago
Alternatives and similar repositories for SharpCovertTube
Users that are interested in SharpCovertTube are comparing it to the libraries listed below
Sorting:
- Continuous password spraying tool☆184Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 4 months ago
- PowerShell Obfuscator☆174Updated 11 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 7 months ago
- A collection of Cobalt Strike Aggressor scripts.☆96Updated 3 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆187Updated 2 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- ☆157Updated last year
- Chrome browser extension-based Command & Control☆137Updated 3 months ago
- ☆103Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 8 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- Repo for all my exploits/PoCs☆50Updated last week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆164Updated 5 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated 2 weeks ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆94Updated last month
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆101Updated 6 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 4 months ago
- ☆174Updated 6 months ago
- Our Tips&Tricks☆118Updated 2 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆148Updated last month
- ☆85Updated 4 months ago