stivenhacker / EchoStrike
Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.
☆159Updated 4 months ago
Alternatives and similar repositories for EchoStrike:
Users that are interested in EchoStrike are comparing it to the libraries listed below
- Everything and anything related to password spraying☆128Updated 7 months ago
- Reverse shell that can bypass windows defender detection☆159Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆149Updated 8 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆259Updated 2 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆140Updated 7 months ago
- PowerShell Obfuscator☆104Updated 7 months ago
- Continuous password spraying tool☆121Updated 3 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆248Updated 5 months ago
- ☆280Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆235Updated 2 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆107Updated 2 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆159Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆136Updated this week
- ☆281Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆149Updated last month
- Different methods to get current username without using whoami☆173Updated 11 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆268Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆181Updated 11 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆103Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆81Updated 2 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆175Updated 2 months ago
- ☆161Updated 2 months ago
- ☆162Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆279Updated 8 months ago
- ☆138Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆253Updated 3 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆329Updated 2 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆184Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆152Updated last month