w1th4d / JarPlantLinks
Java archive implant toolkit.
☆61Updated 8 months ago
Alternatives and similar repositories for JarPlant
Users that are interested in JarPlant are comparing it to the libraries listed below
Sorting:
- .NET deserialization hunter☆81Updated last year
- ysoserial.net docker image☆28Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 9 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆23Updated last month
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆25Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- ☆73Updated last year
- ☆53Updated 10 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- ☆82Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 4 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆47Updated 6 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆31Updated 3 years ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- ☆53Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Updated 3 months ago
- Exploits Unauth Docker API☆43Updated 8 months ago
- GitLab Attack TOolkit☆33Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Updated 11 months ago
- Validates priv escalation of AD trusts☆48Updated 8 months ago
- dump Chrome cookies remotely with atexec and CDP☆68Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 5 months ago
- SAM Dumping in C#☆54Updated last month