trickster0 / Lenum
Linux Enumeration / Privilege escalation tool
☆23Updated 4 years ago
Alternatives and similar repositories for Lenum
Users that are interested in Lenum are comparing it to the libraries listed below
Sorting:
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last month
- Rusty Impersonate☆95Updated last year
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆153Updated last year
- Artifact monitoring that ensures fairplay☆75Updated 3 months ago
- Rust in-memory dumper☆108Updated last year
- Executables on Disk? Bleh 🤮☆100Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- rcat☆67Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 4 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆12Updated 4 years ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Your syscall factory☆121Updated 2 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆91Updated last year
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- ☆69Updated last year