skelsec / asysocks
Socks5 / Socks4 client and server library
☆67Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for asysocks
- Get Fine Grained Password Policy☆65Updated 6 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆78Updated last year
- Golang search engine scraper intended for identification of published ClickOnce deployments☆68Updated last year
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- Living Off the Foreign Land setup scripts☆62Updated 2 weeks ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆114Updated 5 months ago
- Slide decks and/or materials from conference presentations☆54Updated last year
- Smart Card PIN swiping DLL☆74Updated 4 years ago
- Find .net assemblies locally☆88Updated 2 years ago
- ☆83Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆87Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- ☆68Updated last year
- ☆34Updated last year
- ☆103Updated 6 months ago
- ☆68Updated 2 years ago
- Your syscall factory☆122Updated last month
- ☆89Updated 2 years ago
- ☆36Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆122Updated 2 months ago
- ☆43Updated 4 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆130Updated last month
- ZSH integration for Impacket☆58Updated last week
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆79Updated 6 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated 10 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆49Updated 3 months ago
- A quick example of the Hells Gate technique in Nim☆93Updated 3 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- ☆47Updated last year