Arvanaghi / SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
☆1,250Updated 2 years ago
Alternatives and similar repositories for SessionGopher:
Users that are interested in SessionGopher are comparing it to the libraries listed below
- PowerShell Pass The Hash Utils☆1,553Updated 6 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,484Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,496Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆826Updated 6 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Updated 4 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,532Updated 5 years ago
- HTA encryption tool for RedTeams☆1,382Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,099Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆940Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,788Updated 3 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆812Updated 8 months ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,248Updated 5 years ago
- Cheat sheets for various projects.☆1,045Updated 7 years ago
- ☆1,419Updated 2 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,280Updated 2 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,454Updated 3 years ago
- Socks proxy, and reverse socks server using powershell.☆784Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,156Updated 5 years ago
- Responder Windows Version Beta☆517Updated 7 months ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 2 years ago
- PowerShell Scripts I find useful☆747Updated 8 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,652Updated 6 months ago
- A (partial) Python rewriting of PowerSploit's PowerView☆952Updated last week
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆854Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆928Updated 7 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- Active Directory information dumper via LDAP☆1,223Updated 6 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,495Updated last year
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,578Updated 4 years ago
- Exchange privilege escalations to Active Directory☆749Updated last year