s0i37 / exfiltrateLinks
exfiltration/infiltration toolkit
☆45Updated 7 months ago
Alternatives and similar repositories for exfiltrate
Users that are interested in exfiltrate are comparing it to the libraries listed below
Sorting:
- Useful collection of scapy-scripts and more☆28Updated last year
- Finding secrets in various (non-text) popular files.☆25Updated 5 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆21Updated last month
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- ☆54Updated 6 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆36Updated 2 years ago
- ☆47Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last week
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Rewriting SIET to python3☆50Updated 8 months ago
- ☆70Updated 3 weeks ago
- ☆93Updated 4 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- ☆51Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆73Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆81Updated last year
- BloodHound PowerShell client☆56Updated 2 months ago
- Discord C2 Profile for Mythic☆29Updated 4 months ago