ricardojoserf / SharpCovertTube
Youtube as C2 channel - Control Windows systems uploading videos to Youtube
☆79Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for SharpCovertTube
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆147Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Continuous password spraying tool☆117Updated this week
- ☆99Updated 2 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆180Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆73Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆135Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆166Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Documents Exfiltration project for fun and educational purposes☆144Updated last year
- ☆143Updated 2 weeks ago
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- Everything and anything related to password spraying☆126Updated 6 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆88Updated 3 weeks ago
- A collection of Cobalt Strike Aggressor scripts.☆85Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 3 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆136Updated 5 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 4 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆104Updated last month
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆157Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆108Updated last month
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated last week
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆127Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆169Updated last month
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year