WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin
☆64Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for msfbot
Users that are interested in msfbot are comparing it to the libraries listed below
Sorting:
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- [OLD] Terraform provider plugin for Linode Cloud resources.. See☆15Oct 18, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Apr 17, 2021Updated 4 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆270Apr 30, 2018Updated 7 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- ☆110May 14, 2018Updated 7 years ago