sensepost / go-outView external linksLinks
☄️ go-out - A Golang egress buster.
☆126Feb 6, 2026Updated last week
Alternatives and similar repositories for go-out
Users that are interested in go-out are comparing it to the libraries listed below
Sorting:
- ☆54Aug 13, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- More examples using the Impacket library designed for learning purposes.☆268Nov 4, 2022Updated 3 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Jun 10, 2022Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆202Mar 26, 2025Updated 10 months ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Dec 2, 2021Updated 4 years ago
- Domain Password Audit Tool for Pentesters☆1,023Dec 24, 2025Updated last month
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- LDAP library for auditing MS AD☆485Oct 26, 2025Updated 3 months ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Sep 5, 2025Updated 5 months ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Aug 8, 2021Updated 4 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago