Feed the tool a .nessus file and it will automatically get you MSF shell
☆239Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for msf-autoshell
Users that are interested in msf-autoshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- PowerShell module for Mimikatz☆215Dec 28, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Tool for password spraying RDP☆97Oct 12, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- linikatz is a tool to attack AD on UNIX☆594Oct 19, 2023Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Mar 13, 2026Updated last week
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Sep 3, 2019Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,330Dec 6, 2023Updated 2 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Jan 25, 2020Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 4 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆754May 25, 2024Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,624Jan 23, 2024Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago