ttpreport / siphondnsLinks
Covert data exfiltration via DNS
☆45Updated 3 months ago
Alternatives and similar repositories for siphondns
Users that are interested in siphondns are comparing it to the libraries listed below
Sorting:
- Scripts that automate portions of pentests.☆50Updated last month
- Simple C2 using GitHub repository as comms channel.☆31Updated 7 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 8 months ago
- ☆52Updated last year
- BloodHound PowerShell client☆53Updated last month
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- ☆50Updated 7 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 5 months ago
- Persist like a Dodder☆61Updated 2 weeks ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆47Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆110Updated 3 weeks ago
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- Your Skyfall Infrastructure Pack☆71Updated 2 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆32Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆73Updated last week
- Living off the land searches for explorer and sharepoint☆83Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆51Updated 2 weeks ago
- ☆69Updated last week
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆25Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 2 months ago
- Linux CS bypass technique☆33Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 10 months ago
- ☆55Updated 3 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆36Updated 4 months ago
- ☆55Updated 7 months ago