lateral-movement
There are 33 repositories under lateral-movement topic.
Threekiii/Awesome-Redteam
一个攻防知识仓库 Red Teaming and Offensive Security
opsdisk/the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
The-Viper-One/PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
blackarrowsec/mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
klezVirus/CheeseTools
Self-developed tools for Lateral Movement/Code Execution
blackarrowsec/pivotnacci
A tool to make socks connections through HTTP agents
lawrenceamer/0xsp-Mongoose
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
ZeroMemoryEx/APT38-0day-Stealer
APT38 Tactic PoC for Stealing 0days from security professionals
S1ckB0y1337/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
mez-0/CSharpWinRM
.NET 4.0 WinRM API Command Execution
travisbgreen/hunting-rules
Suricata rules for network anomaly detection
Leo4j/Invoke-SMBRemoting
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
mez-0/winrmdll
C++ WinRM API via Reflective DLL
Viralmaniar/HiveJack
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
mez-0/MoveScheduler
.NET 4.0 Scheduled Job Lateral Movement
thecybermafia/OffensiveActiveDirectory
A set of instructions, command and techniques that help during an Active Directory Assessment.
The-Viper-One/Invoke-RDPThief
Inject RDPThief into memory with PowerShell.
lawrenceamer/TChopper
conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
scipag/KleptoKitty
Invoke-KleptoKitty - Deploys Payloads and collects credentials
databricks-industry-solutions/context-graph-analytics
Time series knowledge graphs for cybersecurity
LMscope/Jbeil
[IEEE SP'24] The Official Implementation of "Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks"
Hagrid29/ReadWrite-DCOM
Perform directory listing, read and write file on remote computer via DCOM methods
AD-Attacks/MITRE-ATT-CK
Active Directory attacks mapped to MITRE ATT&CK Framework
EmilioPanti/worm
A CALDERA plugin
jupyterj0nes/masstin
Masstin: High-Speed DFIR Tool written in Rust and Graph Visualization in Neo4j for Comprehensive Lateral Movement Analysis
Richl-lab/recognize-unusual-logins
This tool is used to find anomalies or suspicious login events, especially to detect lateral movement.
idfp/go-persist
Windows Persistence Techniques implemented in go
Potato-Industries/ssh.exe-windows-10-lolbas
ssh.exe is available in windows 10 / server 2019 by default, let's LOLBAS it up!
pyrrh1c/Start-RdpSessionTakeover
A short script to automate the process of RDP session hijacking.
biringaChi/SEAL
Official Implementation of SEAL: A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. The 15th IEEE International Conference on Security of Information and Networks (SIN'22).
resiliencetheatre/nk-macsec
Out Of Band keying of macsec (L2 encryption for LAN) with Nitrokey HSM modules.
bazilinskyy/videos-animations-crowdsourced
Crowdsourced experiment on the use of lateral position for communication between an automated vehicle and a pedestrian.