Is command prompt blocked on your school/work computers? Here is an easy fix!
☆21Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for CMD_Bypass
Users that are interested in CMD_Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- An operating system made in C# with the COSMOS kit.☆13May 24, 2020Updated 5 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆26Aug 16, 2019Updated 6 years ago
- Changes the window titles of running processes.☆11Aug 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- This is a simple Batch File That Disables Admin For certain Programs. Just Drag the program you want to run as admin into the Batch File …☆14Sep 14, 2020Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Changed version of cryptcat which compiles on Windows 10☆22Jan 23, 2018Updated 8 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Development tool for text protection within batch files.☆15Sep 13, 2017Updated 8 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 8 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago