There are 5 repositories under lateral-movement topic.
一个攻防知识仓库 Red Teaming and Offensive Security
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
Self-developed tools for Lateral Movement/Code Execution
A tool to make socks connections through HTTP agents
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Manipulating and Abusing Windows Access Tokens.
APT38 Tactic PoC for Stealing 0days from security professionals
.NET 4.0 WinRM API Command Execution
Suricata rules for network anomaly detection
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
.NET 4.0 Scheduled Job Lateral Movement
A set of instructions, command and techniques that help during an Active Directory Assessment.
conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
Invoke-KleptoKitty - Deploys Payloads and collects credentials
Time series knowledge graphs for cybersecurity
Perform directory listing, read and write file on remote computer via DCOM methods
A CALDERA plugin
Windows Persistence Techniques implemented in go
This tool is used to find anomalies or suspicious login events, especially to detect lateral movement.
Active Directory attacks mapped to MITRE ATT&CK Framework
A short script to automate the process of RDP session hijacking.
Official Implementation of SEAL: A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. The 15th IEEE International Conference on Security of Information and Networks (SIN'22).
ssh.exe is available in windows 10 / server 2019 by default, let's LOLBAS it up!
Out Of Band keying of macsec (L2 encryption for LAN) with Nitrokey HSM modules.
Crowdsourced experiment on the use of lateral position for communication between an automated vehicle and a pedestrian.
[IEEE SP'24] The Official Implementation of "Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks"