Topic: "lateral-movement"
Threekiii/Awesome-Redteam
一个攻防知识库。A knowledge base for red teaming and offensive security.
Language: Python - Size: 30.8 MB - Last synced at: 12 days ago - Pushed at: 25 days ago - Stars: 3,865 - Forks: 682

opsdisk/the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Size: 5.06 MB - Last synced at: 9 days ago - Pushed at: over 3 years ago - Stars: 2,668 - Forks: 172

ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Size: 621 KB - Last synced at: about 2 months ago - Pushed at: about 1 year ago - Stars: 1,779 - Forks: 306

The-Viper-One/PsMapExec
Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.
Language: PowerShell - Size: 4.29 MB - Last synced at: 4 days ago - Pushed at: 10 days ago - Stars: 972 - Forks: 107

blackarrowsec/mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Language: Python - Size: 180 KB - Last synced at: 8 days ago - Pushed at: over 4 years ago - Stars: 746 - Forks: 114

klezVirus/CheeseTools
Self-developed tools for Lateral Movement/Code Execution
Language: C# - Size: 936 KB - Last synced at: 8 days ago - Pushed at: almost 4 years ago - Stars: 705 - Forks: 143

blackarrowsec/pivotnacci
A tool to make socks connections through HTTP agents
Language: Python - Size: 85 KB - Last synced at: 9 days ago - Pushed at: about 4 years ago - Stars: 704 - Forks: 114

zux0x3a/0xsp-Mongoose 📦
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Language: Pascal - Size: 26.4 MB - Last synced at: about 13 hours ago - Pushed at: about 3 years ago - Stars: 537 - Forks: 122

ZeroMemoryEx/APT38-0day-Stealer
APT38 Tactic PoC for Stealing 0days from security professionals
Language: C++ - Size: 30.3 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 281 - Forks: 41

S1ckB0y1337/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
Language: C++ - Size: 1.1 MB - Last synced at: about 2 months ago - Pushed at: over 4 years ago - Stars: 274 - Forks: 45

Leo4j/Invoke-SMBRemoting
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
Language: PowerShell - Size: 123 KB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 164 - Forks: 23

mez-0/CSharpWinRM
.NET 4.0 WinRM API Command Execution
Language: C# - Size: 468 KB - Last synced at: 6 months ago - Pushed at: over 4 years ago - Stars: 161 - Forks: 21

travisbgreen/hunting-rules
Suricata rules for network anomaly detection
Size: 271 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 159 - Forks: 43

mez-0/winrmdll
C++ WinRM API via Reflective DLL
Language: C++ - Size: 220 KB - Last synced at: 6 months ago - Pushed at: over 3 years ago - Stars: 140 - Forks: 27

Viralmaniar/HiveJack
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
Language: C# - Size: 2.23 MB - Last synced at: about 1 month ago - Pushed at: about 5 years ago - Stars: 108 - Forks: 34

mez-0/MoveScheduler
.NET 4.0 Scheduled Job Lateral Movement
Language: C# - Size: 16.6 KB - Last synced at: 6 months ago - Pushed at: almost 5 years ago - Stars: 86 - Forks: 13

thecybermafia/OffensiveActiveDirectory
A set of instructions, command and techniques that help during an Active Directory Assessment.
Size: 13.7 KB - Last synced at: 19 days ago - Pushed at: over 4 years ago - Stars: 83 - Forks: 18

The-Viper-One/Invoke-RDPThief
Inject RDPThief into memory with PowerShell.
Language: PowerShell - Size: 322 KB - Last synced at: 36 minutes ago - Pushed at: 4 months ago - Stars: 64 - Forks: 8

zux0x3a/TChopper
conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
Language: Pascal - Size: 402 KB - Last synced at: about 13 hours ago - Pushed at: almost 4 years ago - Stars: 54 - Forks: 7

scipag/KleptoKitty
Invoke-KleptoKitty - Deploys Payloads and collects credentials
Language: PowerShell - Size: 23.4 KB - Last synced at: about 1 month ago - Pushed at: almost 4 years ago - Stars: 30 - Forks: 11

databricks-industry-solutions/context-graph-analytics
Time series knowledge graphs for cybersecurity
Language: Python - Size: 20 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 18 - Forks: 6

jupyterj0nes/masstin
Masstin: High-Speed DFIR Tool written in Rust and Graph Visualization in Neo4j for Comprehensive Lateral Movement Analysis
Language: Rust - Size: 2.48 MB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 3 - Forks: 0

AD-Attacks/MITRE-ATT-CK
Active Directory attacks mapped to MITRE ATT&CK Framework
Size: 16.6 KB - Last synced at: about 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

biringaChi/SEAL
Official Implementation of SEAL: A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. The 15th IEEE International Conference on Security of Information and Networks (SIN'22).
Language: Python - Size: 1010 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 1

Richl-lab/recognize-unusual-logins
This tool is used to find anomalies or suspicious login events, especially to detect lateral movement.
Language: R - Size: 17.4 MB - Last synced at: over 2 years ago - Pushed at: over 3 years ago - Stars: 2 - Forks: 1

pyrrh1c/Start-RdpSessionTakeover
A short script to automate the process of RDP session hijacking.
Language: PowerShell - Size: 9.77 KB - Last synced at: over 1 year ago - Pushed at: over 4 years ago - Stars: 2 - Forks: 1

Potato-Industries/ssh.exe-windows-10-lolbas
ssh.exe is available in windows 10 / server 2019 by default, let's LOLBAS it up!
Size: 36.1 KB - Last synced at: 3 months ago - Pushed at: over 5 years ago - Stars: 2 - Forks: 0

idfp/go-persist
Windows Persistence Techniques implemented in go
Language: Go - Size: 2.93 KB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

ivantaktos/Secure-Port-Redirector
🔐 Secure Port Redirector (via SSLStream)
Language: Python - Size: 7.77 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

ZeroTrace404/RedReaper
Modular Red Team simulation framework for offensive security training, adversary emulation, and payload automation.
Language: Python - Size: 10.7 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Gill-Singh-A/SSH-Credential-Logger
A Simple Python Program that makes use of ssh alias and sshpass to obtain SSH Credentials
Language: Python - Size: 10.7 KB - Last synced at: about 2 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

violentqm/Blind-Ghost
my attempt at a lateral movement method using LLMNR/NBT-NS spoofing and HTTP coercion to force execution of a PowerShell commands
Language: PowerShell - Size: 0 Bytes - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

LMscope/Jbeil 📦
[IEEE SP'24] The Official Implementation of "Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks"
Language: Jupyter Notebook - Size: 651 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

ZakiSamy/Red-Team-Toolkit-Collection
Welcome to the Red Team Toolkit Collection repository, is a go-to resource for a comprehensive set of tools for red teaming. This repository aims to equip you with an arsenal of powerful utilities to simulate real-world cyber threats and bolster your organisation's defences.
Size: 39.1 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

bazilinskyy/videos-animations-crowdsourced
Crowdsourced experiment on the use of lateral position for communication between an automated vehicle and a pedestrian.
Language: JavaScript - Size: 656 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0

resiliencetheatre/nk-macsec
Out Of Band keying of macsec (L2 encryption for LAN) with Nitrokey HSM modules.
Language: C - Size: 34.2 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0

Hagrid29/ReadWrite-DCOM
Perform directory listing, read and write file on remote computer via DCOM methods
Language: PowerShell - Size: 6.84 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 0 - Forks: 1
