Arvanaghi / SessionGopherLinks
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
☆1,268Updated 2 years ago
Alternatives and similar repositories for SessionGopher
Users that are interested in SessionGopher are comparing it to the libraries listed below
Sorting:
- PowerShell Pass The Hash Utils☆1,605Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,510Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,130Updated 4 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,541Updated 6 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,540Updated 5 years ago
- HTA encryption tool for RedTeams☆1,398Updated 2 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆840Updated 7 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,801Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,730Updated 10 months ago
- Various PowerShell scripts that may be useful during red team exercise☆947Updated 3 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,271Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,508Updated last year
- ☆1,448Updated 2 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,478Updated 3 years ago
- Cheat sheets for various projects.☆1,061Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆815Updated 11 months ago
- Socks proxy, and reverse socks server using powershell.☆791Updated 4 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆886Updated 7 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,131Updated 7 months ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,188Updated 5 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,008Updated 3 months ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,063Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆947Updated 7 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆854Updated 2 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,020Updated 5 years ago
- PowerShell Scripts I find useful☆752Updated 9 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,349Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,606Updated 4 years ago
- Responder Windows Version Beta☆527Updated 10 months ago