zer1t0 / arplayerLinks
A tool to attack ARP
☆15Updated 4 years ago
Alternatives and similar repositories for arplayer
Users that are interested in arplayer are comparing it to the libraries listed below
Sorting:
- Just some Rust process injector POCs, nothing weird.☆81Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- ☆59Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Exchangelib wrapper for pentesting☆67Updated 11 months ago
- Password Spraying Framework☆64Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55Updated 3 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆139Updated 2 years ago
- Socks5 / Socks4 client and server library☆71Updated 2 months ago
- Kerberos protocol attacker☆140Updated 4 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated last month
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 4 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Updated last year
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆79Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Executables on Disk? Bleh 🤮☆111Updated 2 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 3 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 4 years ago
- Machine Learning Network Share Password Hunting Toolkit☆129Updated 5 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Artifact monitoring that ensures fairplay☆79Updated 11 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- ☆129Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago