Client-side Encrypted Upload Server Python Script
☆66Jul 10, 2025Updated 7 months ago
Alternatives and similar repositories for ExfilServer
Users that are interested in ExfilServer are comparing it to the libraries listed below
Sorting:
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- ☆41Feb 20, 2025Updated last year
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- Python tool to automatically perform SPN-less RBCD attacks.☆120Jan 7, 2026Updated last month
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆96Jan 26, 2026Updated last month
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last week
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 10 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 8 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆163Jan 23, 2026Updated last month
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Jan 30, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- GitHub landing page repo☆12Feb 18, 2026Updated last week
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Oct 1, 2025Updated 4 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆185Mar 14, 2025Updated 11 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 5 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 7 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- ☆23Dec 31, 2025Updated last month
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 3 months ago
- Enumerate Domain Users Without Authentication☆281Apr 22, 2025Updated 10 months ago
- Vast.ai Password Kracking☆92Feb 17, 2026Updated last week
- Python utility that generates "imageless" QR codes in various formats☆137Aug 10, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 7 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- ☆31Aug 13, 2025Updated 6 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆40Updated this week