Arvanaghi / SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
☆1,260Updated 2 years ago
Alternatives and similar repositories for SessionGopher
Users that are interested in SessionGopher are comparing it to the libraries listed below
Sorting:
- PowerShell Pass The Hash Utils☆1,576Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,501Updated 2 years ago
- HTA encryption tool for RedTeams☆1,395Updated 2 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,536Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,520Updated 6 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆837Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,126Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,798Updated 4 years ago
- ☆1,441Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆945Updated 3 years ago
- Cheat sheets for various projects.☆1,054Updated 7 years ago
- PowerShell Scripts I find useful☆752Updated 8 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,263Updated 5 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,123Updated 5 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,696Updated 9 months ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆936Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆813Updated 10 months ago
- Socks proxy, and reverse socks server using powershell.☆787Updated 4 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,314Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,103Updated 2 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆882Updated 7 years ago
- Responder Windows Version Beta☆524Updated 9 months ago
- A (partial) Python rewriting of PowerSploit's PowerView☆986Updated last month
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,172Updated 5 years ago
- Windows Event Log Killer☆1,783Updated last year
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 2 years ago
- Exchange privilege escalations to Active Directory☆762Updated 2 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,352Updated last year
- Active Directory ACL exploitation with BloodHound☆724Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,502Updated last year