AlessandroZ / WinPwnage
π» Elevate, UAC bypass, privilege escalation, dll hijack techniques
β11Updated 6 years ago
Alternatives and similar repositories for WinPwnage:
Users that are interested in WinPwnage are comparing it to the libraries listed below
- A default credential scanner.β9Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.β22Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environmentsβ13Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β17Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ18Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sessβ¦β22Updated 7 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bacβ¦β20Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 2 years ago
- pen testing scriptsβ11Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- Automated encryption utilities and installationβ12Updated 4 years ago
- pentest toolboxβ28Updated 2 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executableβ¦β10Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.β17Updated 4 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.β32Updated 5 years ago
- Automated Penetration Testingβ14Updated 4 years ago
- SkyRAT - Powershell Remote Administration Toolβ31Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teamingβ19Updated 5 years ago
- Repository of tools used in my blogβ50Updated 10 months ago
- Abuses Powershell Profilesβ13Updated 9 years ago
- Disabling Windows Defender & downloading payloadβ20Updated 4 years ago
- HTTP BOTNETβ8Updated last year
- pinky - The PHP mini RAT (Remote Administration Tool)β72Updated 6 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.β17Updated 8 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwordsβ13Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 4 years ago
- Download payload to disk and install it to startup then melt.β34Updated 5 years ago
- using VBS to download and install a powershell malwareβ38Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX filesβ16Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Freeβ21Updated 5 years ago