-
Notifications
You must be signed in to change notification settings - Fork 1
Red Team Tools.
Abusing IPv6 to do MITM on ipv4 only networks. https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/ via mitm6
Spookflare redteam/pentest obfuscation/EPP bypasses
Linux ASLR bypass (untested)
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Automate getting AD creds if you're on an internal network but outside the AD "environment". Icebreaker.
Powershell runspace post exploit tookkit
Execute stuff from ADS streams
Bloodhound Exploring windows AD networks re cred abuse
Run binaries as SYSTEM with signed nvidia binary
Find vulnerable javascript libraries plugin
Guppy Proxy free alternative to Burp.
Proxy stuff over HTTPS websockets
CASM Character aware split method.