EatonChips / wsh
Web shell generator and command line interface.
☆79Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for wsh
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆178Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆322Updated 2 years ago
- ☆290Updated 4 months ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆155Updated 3 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆103Updated 2 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆188Updated last year
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆231Updated 2 years ago
- DCSync Attack from Outside using Impacket☆111Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- Office 365 and Exchange Enumeration☆182Updated 5 years ago
- MSSQL Database Attacker tool☆185Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆41Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆126Updated 2 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆239Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆181Updated 3 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆165Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆137Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆270Updated 2 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆109Updated last year
- Proof-of-concept tools for my AD Forest trust research☆186Updated 5 months ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆207Updated 2 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆147Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆274Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆110Updated 3 years ago
- ☆157Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆186Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆143Updated 4 years ago