Cn33liz / p0wnedShell
☆1,407Updated this week
Related projects: ⓘ
- PowerShell Pass The Hash Utils☆1,460Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,118Updated 3 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,376Updated 5 years ago
- ☆1,042Updated this week
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,494Updated last month
- HTA encryption tool for RedTeams☆1,362Updated last year
- Run PowerShell with rundll32. Bypass software restrictions.☆1,741Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,095Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,466Updated last year
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆798Updated 2 months ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,200Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆817Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,199Updated 4 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,406Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,479Updated last year
- Powershell C2 Server and Implants☆573Updated 4 years ago
- Cheat sheets for various projects.☆1,028Updated 6 years ago
- Exploit the credentials present in files and memory☆837Updated last year
- PowerShell Scripts I find useful☆732Updated 8 years ago
- PowerShell Script to Dump Windows Credentials from the Credential Manager☆718Updated 6 years ago
- Windows Event Log Killer☆1,742Updated 11 months ago
- Various PowerShell scripts that may be useful during red team exercise☆928Updated 2 years ago
- ☆1,385Updated last year
- ☆692Updated 3 years ago
- ☆2,037Updated this week
- Active Directory Assessment and Privilege Escalation Script☆1,090Updated last year
- CACTUSTORCH: Payload Generation for Adversary Simulations☆994Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,046Updated 4 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,230Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆509Updated 2 years ago