All Projects → EncodeGroup → Gopher

EncodeGroup / Gopher

Licence: other
C# tool to discover low hanging fruits

Programming Languages

C#
18002 projects

Projects that are alternatives of or similar to Gopher

Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (-17.81%)
Mutual labels:  offensive-security, redteam, pentesting-tools
Shelly
Automatic Reverse Shell Generator
Stars: ✭ 38 (-47.95%)
Mutual labels:  offensive-security, redteam
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-76.71%)
Mutual labels:  offensive-security, redteam
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+16.44%)
Mutual labels:  offensive-security, redteam
Constole
Scan for and exploit Consul agents
Stars: ✭ 37 (-49.32%)
Mutual labels:  redteam, pentesting-tools
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,991 (+3997.26%)
Mutual labels:  offensive-security, redteam
wifi-pentesting-guide
WiFi Penetration Testing Guide
Stars: ✭ 105 (+43.84%)
Mutual labels:  offensive-security, pentesting-tools
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+472.6%)
Mutual labels:  offensive-security, redteam
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-16.44%)
Mutual labels:  redteam, pentesting-tools
Redteam Tactics And Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,190 (+2900%)
Mutual labels:  offensive-security, redteam
meteor
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-57.53%)
Mutual labels:  offensive-security, redteam
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+161.64%)
Mutual labels:  offensive-security, redteam
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (+19.18%)
Mutual labels:  offensive-security, redteam
Invoke Apex
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+121.92%)
Mutual labels:  offensive-security, redteam
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+957.53%)
Mutual labels:  offensive-security, pentesting-tools
rsGen
rsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (-2.74%)
Mutual labels:  pentesting-tools
DInvoke shellcodeload CSharp
ShellCodeLoader via DInvoke
Stars: ✭ 41 (-43.84%)
Mutual labels:  redteam
InlineWhispers2
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+113.7%)
Mutual labels:  redteam
rustpad
Multi-threaded Padding Oracle attacks against any service. Written in Rust.
Stars: ✭ 75 (+2.74%)
Mutual labels:  pentesting-tools
hackarsenaltoolkit
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-46.58%)
Mutual labels:  pentesting-tools

Gopher

If a credential is there... Gopher will find it!

Will search for low hanging fruits and useful information for escalation on a compromised workstation.

Plays nice with execute-assembly.

Digs the following holes:

  • McAfee repository list files
  • Cached GPP files
  • Unattended installation files
  • PowerShell history files
  • AWS credential files
  • Azure credential files
  • Google Cloud credential files
  • RDP sessions
  • PuTTY sessions
  • SuperPuTTY sessions
  • WinSCP sessions
  • FileZilla sessions
  • VNC settings
  • TeamViewer settings
  • PulseSecure saved passwords

Detection

Consider placing SACLs to specific registry keys with the use of Set-AuditRule

Author

@eksperience

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].