skelsec / aardwolfLinks
Asynchronous RDP client for Python (headless)
☆181Updated last month
Alternatives and similar repositories for aardwolf
Users that are interested in aardwolf are comparing it to the libraries listed below
Sorting:
- PoC to coerce authentication from Windows hosts using MS-WSP☆249Updated last year
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 5 months ago
- (Demo) 3rd party agent for Havoc☆139Updated last year
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆187Updated 4 years ago
- The Official Sliver Armory☆109Updated 2 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 7 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆110Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆130Updated last year
- A BOF to automate common persistence tasks for red teamers☆279Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆137Updated last year
- A Python gRPC Client Library for Sliver☆69Updated 2 months ago
- ACL abuse swiss-knife☆124Updated 2 years ago
- ☆221Updated last year
- Patching AmsiOpenSession by forcing an error branching☆146Updated last year
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆277Updated 3 years ago
- My implementation of the GIUDA project in C++☆184Updated last year
- Single executable reverse SOCKS5 proxy written in Golang.☆137Updated 5 months ago
- COFF file (BOF) for managing Kerberos tickets.☆300Updated last year
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- ☆126Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆339Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆83Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆140Updated last year
- Extracting NetNTLM without touching lsass.exe☆237Updated last year
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- Proof-of-concept tools for my AD Forest trust research☆217Updated last year
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆84Updated 3 years ago