tid4l / GoWardLinks
A robust Red Team proxy written in Go.
☆164Updated 3 years ago
Alternatives and similar repositories for GoWard
Users that are interested in GoWard are comparing it to the libraries listed below
Sorting:
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆98Updated last year
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆162Updated 3 years ago
- Source Code Management Attack Toolkit☆223Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- ☆95Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 4 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆333Updated 3 years ago
- Azure AD Password Checker☆85Updated 9 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated 2 years ago
- ☆122Updated 2 years ago
- ☆239Updated 11 months ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- ACL abuse swiss-knife☆123Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆109Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆108Updated 3 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Updated 3 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆199Updated 4 years ago