ttpreport / siphondnsLinks
Covert data exfiltration via DNS
☆49Updated 7 months ago
Alternatives and similar repositories for siphondns
Users that are interested in siphondns are comparing it to the libraries listed below
Sorting:
- Deploy a phishing infrastructure on the fly.☆75Updated 8 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated last year
- Your Skyfall Infrastructure Pack☆76Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 9 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 3 weeks ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- ☆59Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆76Updated 3 weeks ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆87Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- Red Team Collaboration Infrastructure☆95Updated 4 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- Simple C2 using GitHub repository as comms channel.☆31Updated 10 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 8 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- Scripts that automate portions of pentests.☆52Updated last month
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Updated 5 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆77Updated 5 months ago
- ☆110Updated 10 months ago
- C2 writen in Rust & Go powered by Tor network.☆136Updated last month
- ☆35Updated 3 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆79Updated last week
- Discord C2 Profile for Mythic☆32Updated 6 months ago