Category: Ethical Hacking

post-exploitation container

nysm: A stealth post-exploitation container

nysm: A stealth post-exploitation container With the rise in popularity of offensive tools based on eBPF, going from credential stealers to rootkits hiding their own PID, a question came to our mind: Would it...

Offensive MSSQL toolkit

PySQLRecon: Offensive MSSQL toolkit written in Python

PySQLRecon PySQLRecon is a Python port of the awesome SQLRecon project by @sanjivkawa. See the commands section for a list of capabilities. Commands All of the main modules from SQLRecon have equivalent commands. Commands noted with [PRIV] require elevated...

Java archive implant toolkit

JarPlant: Java archive implant toolkit

Java Archive Implant Toolkit Inject malicious payloads into JAR files. Configuration JarPlant supports injection of custom values with the implants. A set of common configuration properties are defined with the template and built-in implants....

inspect LDAP packets

ldapx: inspect & transform all LDAP packets

ldapx Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly. Usage Where: -f will apply Filter middlewares to all applicable requests -a will apply...

GitHub Actions

Git-Rotate: Bypassing IP Blocks with GitHub Actions

Git-Rotate Leveraging GitHub Actions for IP Rotation – for more information see the following blog post. The Sprayer and Catcher components are currently configured to target the Microsoft login portal and handle the response data. You’ll need to modify...

TCP tunnel

bore: modern, simple TCP tunnel in Rust

bore A modern, simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection firewalls. That’s all it does: no more and no less. # On your local machine...