EatonChips / wsh
Web shell generator and command line interface.
☆83Updated 4 years ago
Alternatives and similar repositories for wsh:
Users that are interested in wsh are comparing it to the libraries listed below
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆180Updated 3 years ago
- Automatic ProxyShell Exploit☆113Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆108Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆322Updated 2 years ago
- ☆292Updated 6 months ago
- Use python to perform Kerberos pre-auth bruteforcing☆193Updated last year
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Updated 3 years ago
- Shell Simulation over Net-SNMP with extend functionality☆93Updated 4 years ago
- Office 365 and Exchange Enumeration☆184Updated 5 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆196Updated last month
- MS-FSRVP coercion abuse PoC☆282Updated 3 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆123Updated last year
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- ☆160Updated 2 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆108Updated 2 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆239Updated 3 years ago
- Another Go Shellcode Loader using Windows APIs☆139Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆87Updated 3 years ago
- Programmatically create an administrative user under Windows☆179Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆41Updated 3 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆127Updated 3 years ago
- MSSQL Database Attacker tool☆189Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆298Updated last year
- Collection of tested Cobaltstrike aggressor scripts.☆110Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆207Updated 3 years ago
- Python implementation for PetitPotam☆190Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆104Updated 3 years ago