wunderwuzzi23 / natty-slipstream
Simplified NAT Slipstream server and client
☆20Updated 4 years ago
Alternatives and similar repositories for natty-slipstream:
Users that are interested in natty-slipstream are comparing it to the libraries listed below
- A Canary which fires when uninstalled☆34Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Provides access to libhashcat☆30Updated last year
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- The hidden mstsc recorder player☆28Updated 5 years ago