A-D-Team / SharpMemshell
Memshell
☆273Updated 3 years ago
Alternatives and similar repositories for SharpMemshell:
Users that are interested in SharpMemshell are comparing it to the libraries listed below
- 提取DC日志,快速获取域用户对应IP地址☆303Updated 3 years ago
- vhost password decrypt☆246Updated 6 months ago
- 获取Exchange信息的小工具☆224Updated last year
- 获取服务器或域控登录日志☆270Updated last year
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆204Updated 3 years ago
- Mssql利用工具☆264Updated last year
- Modifying JuicyPotato to support load shellcode and webshell☆190Updated 3 years ago
- RPC远程主机信息匿名扫描工具☆318Updated 2 years ago
- NTLM relay test.☆187Updated last year
- Bypass AV 用户添加☆167Updated 3 years ago
- Yet another SharpSphere☆222Updated 3 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆333Updated 3 years ago
- ☆154Updated 10 months ago
- 一款OutLook信息收集工具☆235Updated last year
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- Exchange 服务器安全性的辅助测试工具☆322Updated last year
- Zerologon exploit with restore DC password automatically☆133Updated last year
- ☆337Updated 2 years ago
- 利用NTLM Hash读取Exchange邮件☆421Updated 3 months ago
- 一个能快速开启和关闭匿名SMB共享的红队脚本☆173Updated 3 years ago
- Take a screenshot without injection for Cobalt Strike☆186Updated last year
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆276Updated 3 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆179Updated 3 years ago
- ☆219Updated 3 years ago
- Cobalt Strike AggressorScripts For Red Team☆154Updated 3 years ago
- ☆274Updated last month
- ☆191Updated 3 years ago
- ☆205Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆279Updated 2 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆149Updated 2 years ago