twelvesec / dexter
Data EXfiltration TestER
☆21Updated 5 years ago
Alternatives and similar repositories for dexter:
Users that are interested in dexter are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- ☆17Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- ☆15Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Password spraying toolkit☆7Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆28Updated 7 years ago
- ☆11Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆25Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆11Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- ☆14Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- ☆26Updated 6 years ago