rsmudge / Layer2-Pivoting-ClientLinks
A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.
☆77Updated 11 years ago
Alternatives and similar repositories for Layer2-Pivoting-Client
Users that are interested in Layer2-Pivoting-Client are comparing it to the libraries listed below
Sorting:
- ☆78Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Updated 6 years ago
- ☆24Updated 8 years ago
- few months old but better than nothing☆58Updated 3 years ago
- PoC dlls for Task Scheduler COM Hijacking☆95Updated 9 years ago
- ☆55Updated 8 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Updated 7 years ago
- A sample bot for Cobalt Strike 3☆22Updated 9 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- ☆89Updated 7 years ago
- ☆95Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Updated 7 years ago
- ☆94Updated 7 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- ☆83Updated 9 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 9 months ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- ☆65Updated 9 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆121Updated 4 years ago