Arvanaghi / SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
☆1,223Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SessionGopher
- PowerShell Pass The Hash Utils☆1,472Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆1,473Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,121Updated 3 years ago
- ☆1,395Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆823Updated 6 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,386Updated 6 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,219Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,521Updated 5 years ago
- Cheat sheets for various projects.☆1,041Updated 7 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,228Updated last year
- Run PowerShell with rundll32. Bypass software restrictions.☆1,771Updated 3 years ago
- HTA encryption tool for RedTeams☆1,369Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,550Updated 3 months ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆802Updated 4 months ago
- PowerShell Scripts I find useful☆735Updated 8 years ago
- Responder Windows Version Beta☆500Updated 3 months ago
- A little toolbox to play with Microsoft Kerberos in C☆1,421Updated 2 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,101Updated 5 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆908Updated this week
- Various PowerShell scripts that may be useful during red team exercise☆930Updated 2 years ago
- Windows Event Log Killer☆1,754Updated last year
- Socks proxy, and reverse socks server using powershell.☆776Updated 3 years ago
- Exchange privilege escalations to Active Directory☆727Updated last year
- Active Directory information dumper via LDAP☆1,181Updated 2 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,483Updated last year
- Active Directory Assessment and Privilege Escalation Script☆1,091Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆899Updated 6 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆827Updated 6 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆509Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆701Updated 2 years ago