☄️ go-out - A Golang egress buster.
☆126Feb 6, 2026Updated last month
Alternatives and similar repositories for go-out
Users that are interested in go-out are comparing it to the libraries listed below
Sorting:
- ☆54Aug 13, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- More examples using the Impacket library designed for learning purposes.☆264Nov 4, 2022Updated 3 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated 11 months ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Domain Password Audit Tool for Pentesters☆1,024Dec 24, 2025Updated 2 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- LDAP library for auditing MS AD☆486Feb 11, 2026Updated 3 weeks ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago