s0i37 / exfiltrateView external linksLinks
exfiltration/infiltration toolkit
☆49Oct 31, 2024Updated last year
Alternatives and similar repositories for exfiltrate
Users that are interested in exfiltrate are comparing it to the libraries listed below
Sorting:
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Collection of antivirus bypass techniques☆12Nov 20, 2023Updated 2 years ago
- karma WiFi attack implementation☆55Oct 23, 2024Updated last year
- ☆12Aug 1, 2023Updated 2 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 9 months ago
- ☆26Jan 7, 2024Updated 2 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- Capture screenshots from .NET using .NET methods or Windows API calls☆67Mar 9, 2020Updated 5 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- TabsBroadcast is a library for managing inter-tab communication via the BroadcastChannel API.☆22Oct 12, 2025Updated 4 months ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Attack on a local network using an ARP vulnerability☆11Jan 12, 2022Updated 4 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆52Jul 28, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- reverse socks tunneler with ntlm and proxy support☆60Aug 9, 2022Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Aug 26, 2021Updated 4 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆41Dec 5, 2025Updated 2 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- Monitor changes in Active Directory with replication metadata☆91Jul 9, 2024Updated last year
- ADCS cert template modification and ACL enumeration☆144Jun 26, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆222Dec 3, 2025Updated 2 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111May 19, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 10 months ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago