ricardojoserf / http-protocol-exfil
Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)
☆21Updated 3 years ago
Alternatives and similar repositories for http-protocol-exfil:
Users that are interested in http-protocol-exfil are comparing it to the libraries listed below
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆35Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Updated 4 years ago
- ☆17Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- miscellaneous sploit scripts/hacks☆15Updated last month
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- c# reverse shell poc☆26Updated 6 years ago
- ☆16Updated 11 months ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated last year
- Right-To-Left Override POC☆34Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- ☆16Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago