0xmitsurugi / gimmecredzView external linksLinks
You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.
☆169Jan 25, 2020Updated 6 years ago
Alternatives and similar repositories for gimmecredz
Users that are interested in gimmecredz are comparing it to the libraries listed below
Sorting:
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Dec 8, 2022Updated 3 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Dec 19, 2023Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆357Nov 14, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- ☆98Feb 21, 2019Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Some scripts and exploits☆147Jul 9, 2018Updated 7 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Pop shells like a master.☆1,488Apr 2, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆683May 9, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago