WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin
☆64Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for msfbot
Users that are interested in msfbot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- ☆110May 14, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Apr 17, 2021Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- [OLD] Terraform provider plugin for Linode Cloud resources.. See☆15Oct 18, 2018Updated 7 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Resolve and quickly portscan a list of (sub)domains.☆88Jul 4, 2016Updated 9 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago