skelsec / evilrdp
☆284Updated last year
Alternatives and similar repositories for evilrdp:
Users that are interested in evilrdp are comparing it to the libraries listed below
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆276Updated 3 months ago
- Everything and anything related to password spraying☆132Updated 9 months ago
- ☆189Updated 5 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆252Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆274Updated 4 months ago
- ☆271Updated last year
- Continuous password spraying tool☆129Updated 2 weeks ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆146Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆180Updated 6 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆190Updated 2 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆198Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆159Updated 2 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆249Updated 6 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆158Updated 2 months ago
- ☆297Updated 3 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆276Updated 9 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆266Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆561Updated 8 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆251Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…