s0i37 / netLinks
Useful collection of scapy-scripts and more
☆32Updated last year
Alternatives and similar repositories for net
Users that are interested in net are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆49Updated last year
- ☆94Updated 5 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆149Updated last year
- Finding secrets in various (non-text) popular files.☆51Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- About PIVOting☆13Updated 2 years ago
- 1C RAS Offensive Security Tool☆28Updated 2 years ago
- ☆29Updated 2 years ago
- Automate converting webshells into reverse shells.☆72Updated this week
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆25Updated 11 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆105Updated 2 years ago
- karma WiFi attack implementation☆55Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆55Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆100Updated 3 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆27Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago